wireshark vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://wireshark.org|wireshark package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Buffer Over-read

[4.4.0,4.4.2)[4.2.0,4.2.9)
  • H
Infinite loop

[4.4.0,4.4.2)[4.2.0,4.2.9)
  • H
Improper Handling of Missing Values

[4.2.0,4.2.8)[4.4.0,4.4.1)
  • H
Missing Initialization of a Variable

[,4.4.1)
  • M
Access of Uninitialized Pointer

[4.0.0,4.0.16)[4.2.0,4.2.5)
  • H
Expired Pointer Dereference

[4.0.0,4.0.16)[4.2.0,4.2.6)
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

[,3.6.23)[4.0.0,4.0.15)[4.2.0,4.2.5)
  • L
Mismatched Memory Management Routines

[0,)
  • L
Use After Free

[0,)
  • H
Mismatched Memory Management Routines

[0,)
  • H
Buffer Overflow

[,4.2.0)
  • H
Denial of Service (DoS)

[,4.2.0)
  • H
Buffer Overflow

[,4.2.0)
  • M
Uncontrolled Recursion

[4.2.0,4.2.1)
  • M
Uncontrolled Recursion

[4.2.0,4.2.1)
  • M
Uncontrolled Recursion

[,3.6.20)[4.0.0,4.0.12)[4.2.0,4.2.1)
  • M
Out-of-bounds Read

[4.2.0,4.2.1)
  • M
NULL Pointer Dereference

[,3.6.20)[4.0.0,4.0.12)[4.2.0,4.2.1)
  • M
Out-of-bounds Read

[4.0.0,4.0.11)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[3.6.0,3.6.19)[4.0.0,4.0.11)
  • M
Memory Leak

[,3.6.17)[4.0.0,4.0.9)
  • H
Denial of Service (DoS)

[3.6.0,3.6.16)[4.0.0,4.0.8)
  • H
Denial of Service (DoS)

[3.6.0,3.6.16)[4.0.0,4.0.8)
  • H
Denial of Service (DoS)

[4.0.0,4.0.8)
  • M
Division by zero

[,4.0.8)
  • M
Heap-based Buffer Overflow

[,4.0.6)
  • M
Infinite loop

[3.6.0,3.6.13)[4.0.0,4.0.6)
  • H
Out-of-bounds Write

[3.0.0,3.6.14)[4.0.0,4.0.6)
  • H
Heap-based Buffer Overflow

[3.0.0,3.6.14)[4.0.0,4.0.6)
  • H
Heap-based Buffer Overflow

[3.6.0,3.6.14)[4.0.0,4.0.6)
  • H
Heap-based Buffer Overflow

[4.0.0,4.0.6)
  • M
Buffer Over-read

[4.0.0,4.0.6)
  • M
Out-of-bounds Read

[3.6.0,3.6.14)[4.0.0,4.0.6)
  • M
Out-of-bounds Read

[3.6.0,3.6.14)[4.0.0,4.0.6)
  • M
Denial of Service (DoS)

[3.6.0,3.6.13)[4.0.0,4.0.5)
  • M
Denial of Service (DoS)

[3.6.0,3.6.13)[4.0.0,4.0.5)
  • M
Denial of Service (DoS)

[3.6.0,3.6.13)[4.0.0,4.0.5)
  • M
Denial of Service (DoS)

[3.6.0,3.6.13)[4.0.0,4.0.5)
  • M
Denial of Service (DoS)

[3.6.0,3.6.12)[4.0.0,4.0.4)
  • M
Buffer Overflow

[3.6.0,3.6.11)[4.0.0,4.0.3)
  • M
Denial of Service (DoS)

[3.6.0,3.6.11)[4.0.0,4.0.3)
  • M
Denial of Service (DoS)

[3.6.0,3.6.11)[4.0.0,4.0.3)
  • M
Denial of Service (DoS)

[3.6.0,3.6.11)[4.0.0,4.0.3)
  • M
Denial of Service (DoS)

[4.0.0,4.0.3)
  • M
Denial of Service (DoS)

[3.6.0,3.6.11)[4.0.0,4.0.3)
  • M
Denial of Service (DoS)

[3.6.0,3.6.11)[4.0.0,4.0.3)
  • M
Denial of Service (DoS)

[3.6.0,3.6.10)[4.0.0,4.0.2)
  • M
Denial of Service (DoS)

[3.6.0,3.6.10)[4.0.0,4.0.2)
  • H
Denial of Service (DoS)

[3.6.0,3.6.9)
  • M
Denial of Service (DoS)

[3.6.0,3.6.9)
  • M
Denial of Service (DoS)

[3.6.0,3.6.9)
  • H
Denial of Service (DoS)

[,3.7.0)
  • H
Denial of Service (DoS)

[3.4.0,3.4.11)
  • H
Denial of Service (DoS)

[,v3.4.11)[v3.5.0,v3.6.1)
  • H
Infinite loop

[3.4.0,3.4.11)[3.6.0,3.6.1)
  • H
Infinite loop

[3.4.0,3.4.11)[3.6.0,3.6.1)
  • H
Infinite loop

[3.4.0,3.4.11)[3.6.0,3.6.1)
  • H
Denial of Service (DoS)

[,3.6.1)
  • M
Denial of Service (DoS)

[3.4.0,3.4.12)[3.6.0,3.6.2)
  • M
Infinite loop

[3.4.0,3.4.12)[3.6.0,3.6.2)
  • H
Denial of Service (DoS)

[3.4.0,3.4.12)[3.6.0,3.6.2)
  • H
Denial of Service (DoS)

[3.4.0,3.4.12)[3.6.0,3.6.2)
  • M
Denial of Service (DoS)

[3.4.0,3.4.12)[3.6.0,3.6.2)
  • H
NULL Pointer Dereference

[0,3.4.10)
  • H
Buffer Overflow

[0,3.4.10)
  • H
Buffer Overflow

[0,3.4.10)
  • H
Buffer Overflow

[0,3.4.10)
  • H
NULL Pointer Dereference

[0,3.4.10)
  • H
NULL Pointer Dereference

[0,3.4.10)
  • H
Buffer Overflow

[0,3.4.10)
  • H
Denial of Service (DoS)

[0,3.4.10)
  • H
Denial of Service (DoS)

[0,3.4.10)
  • M
Resource Management Errors

[,1.10.11)[1.12.0,1.12.2)
  • M
Improper Input Validation

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • H
Out-of-Bounds

[0.10.8,1.2.8]
  • M
Improper Input Validation

[,0.99.6)
  • H
Denial of Service (DoS)

[,2.0.12)[2.2.0,2.2.6)
  • M
Use After Free

[0,2.0.6)
  • M
Resource Management Errors

[0,1.12.13)
  • M
Out-of-Bounds

[,1.10.11)[1.12.0,1.12.2)
  • M
Improper Data Handling

[0,1.10.13)
  • H
Out-of-Bounds

[0.9.15,1.2.5]
  • H
Out-of-Bounds

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • H
Denial of Service (DoS)

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • H
Improper Input Validation

[2.6.0,2.6.15)[3.0.0,3.0.9)[3.2.0,3.2.2)
  • H
Improper Input Validation

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • M
Denial of Service (DoS)

[,1.4.4)
  • M
Out-of-Bounds

[0,1.10.1)
  • M
Use of Externally-Controlled Format String

[,1.8.7)
  • M
Improper Input Validation

[0,2.0.2)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Denial of Service (DoS)

[,0.99.3]
  • M
Information Exposure

[,1.8.4)
  • M
Out-of-Bounds

[1.2.0,1.5.0]
  • H
Denial of Service (DoS)

[2.4.0,2.4.14)[2.6.0,2.6.8)
  • M
Out-of-Bounds

[,1.12.1)
  • M
Improper Input Validation

[0.99.6a,1.0.5]
  • M
Resource Management Errors

[0.99.2,1.0.3]
  • M
Improper Input Validation

[1.2,1.2.1]
  • H
Improper Input Validation

[,2.0.13)[2.2.0,2.2.7)
  • H
Arbitrary Code Injection

[,2.0.12)[2.2.0,2.2.6)
  • H
Denial of Service (DoS)

[3.4.0,3.4.6)
  • H
Out-of-bounds Read

[2.0.0,2.0.15)[2.2.0,2.2.9)
  • H
Use of Externally-Controlled Format String

[2.0.0,2.0.16)[2.2.0,2.2.10)[2.4.0,2.4.2)
  • H
Out-of-Bounds

[2.2.0,2.2.12)[2.4.0,2.4.4)
  • H
Denial of Service (DoS)

[2.0.0,2.0.11)[2.2.0,2.2.5)
  • H
Incorrect Calculation

[3.2.0,3.2.8)
  • M
Denial of Service (DoS)

[,1.0.0]
  • M
Out-of-Bounds

[0.99,0.99.6]
  • M
Denial of Service (DoS)

[,1.8.2)
  • M
Improper Input Validation

[0,1.12.9)
  • M
Improper Input Validation

[0,2.0.1)
  • M
Denial of Service (DoS)

[0.99.2,0.99.8]
  • H
Memory Leak

[2.6.0,2.6.4)
  • H
Improper Initialization

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Denial of Service (DoS)

[,1.12.13)[2.0.0,2.0.5)
  • M
Improper Input Validation

[0.99.2,0.99.8]
  • H
Incorrect Calculation

[2.6.0,2.6.4)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
NULL Pointer Dereference

[3.0.0,3.0.8)
  • M
Improper Input Validation

[,1.12.12)[2.0.0,2.0.4)
  • M
Denial of Service (DoS)

[,1.8.10)[1.10.0,1.10.2)
  • H
Improper Input Validation

[,2.0.12)[2.2.0,2.2.6)
  • M
Improper Input Validation

[0,1.12.7)
  • H
Improper Input Validation

[2.0.0,2.0.11)[2.2.0,2.2.5)
  • M
Denial of Service (DoS)

[0,2.0.3)
  • M
Denial of Service (DoS)

[0,2.0.3)
  • M
Resource Management Errors

[,1.2.18)
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Out-of-Bounds

[,2.0.8)[2.2.0,2.2.2)
  • M
Denial of Service (DoS)

[0.7.9,0.99.3]
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Out-of-Bounds

[0,1.8.6)
  • H
Out-of-bounds Write

[2.4.0,2.4.14)[2.6.0,2.6.8)
  • M
Resource Management Errors

[,1.12.13)[2.0.0,2.0.5)
  • C
Out-of-Bounds

[0.99.5,0.99.6]
  • H
Out-of-Bounds

[,1.4.5)
  • M
Out-of-Bounds

[,1.2.17)[1.4.0,1.4.7)
  • M
Out-of-Bounds

[0,1.10.10)
  • H
CVE-2018-7337

[2.4.0,2.4.5)
  • M
Denial of Service (DoS)

[,1.10.8)
  • M
Improper Input Validation

[0.10.2,1.0.2]
  • M
Improper Access Control

[,1.12.x)[2.0.,2.0.x)
  • M
Resource Management Errors

[0,1.12.6)
  • H
Memory Leak

[2.6.0,2.6.15)[3.0.0,3.0.9)[3.2.0,3.2.2)
  • H
Out-of-Bounds

[2.2.0,2.2.7)
  • H
NULL Pointer Dereference

[2.2.0,2.2.7)
  • M
Out-of-Bounds

[0,2.0.2)
  • H
Improper Input Validation

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Remote Code Execution (RCE)

[,1.4.14)[1.6.0,1.6.9)[1.8.0,1.8.1)
  • M
Improper Input Validation

[,1.10.12)[1.12.0,1.12.3)
  • M
Resource Management Errors

[1.2.0,1.4.3]
  • M
Out-of-Bounds

[,1.12.10)[2.0.0,2.0.2)
  • H
Out-of-Bounds

[0,1.10.4)
  • H
Denial of Service (DoS)

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Out-of-Bounds

[0,2.0.6)
  • M
Improper Input Validation

[,1.8.11)[1.10.0,1.10.3)
  • H
Denial of Service (DoS)

[0,3.0.1)
  • M
Resource Management Errors

[0,wireshark-1.8.8)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Denial of Service (DoS)

[0,1.10.1)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Denial of Service (DoS)

[0.8.20,1.0.6]
  • M
Memory Leak

[3.2.0,3.2.9)[3.4.0,3.4.1)
  • M
Out-of-Bounds

[,1.10.9)
  • L
Cryptographic Issues

[,1.6.13)[1.8.0,1.8.5)
  • M
Out-of-Bounds

[,1.8.3)
  • M
Resource Management Errors

[0.10.11,0.99.0]
  • M
Resource Management Errors

[0,1.12.5)
  • M
Improper Data Handling

[0,1.12.4)
  • M
NULL Pointer Dereference

[,1.12.12)[2.0.0,2.0.4)
  • H
Denial of Service (DoS)

[0,3.0.1)
  • M
Denial of Service (DoS)

[1.4.0,1.4.3]
  • H
Buffer Overflow

[,2.2.7]
  • H
Denial of Service (DoS)

[0,1.12.5)
  • M
Out-of-Bounds

[,1.12.12)[2.0.0,2.0.4)
  • H
Integer Overflow or Wraparound

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Denial of Service (DoS)

[0.9.2,1.2.0]
  • M
Improper Input Validation

[0,2.0.3)
  • H
Improper Validation

[2.6.0,2.6.20)[3.0.0,3.0.14)[3.2.0,3.2.7)
  • H
Denial Of Service (DoS)

[0,2.4.2)
  • H
Denial of Service (DoS)

[2.0.0,2.0.14)
  • M
Denial of Service (DoS)

[,1.6.3)
  • M
Improper Input Validation

[0,2.0.4)
  • H
Out-of-bounds Read

[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Resource Management Errors

[0.9.8,0.99.6]
  • M
Improper Input Validation

[0,2.0.2)
  • M
Out-of-Bounds

[0,1.12.12)
  • M
Denial of Service (DoS)

[0,0.99.5-1)
  • M
Denial of Service (DoS)

[0.6,0.99.7]
  • H
Out-of-bounds Read

[2.4.0,2.4.11)[2.6.0,2.6.5)
  • M
Improper Input Validation

[0,2.0.1)
  • H
Denial of Service (DoS)

[,1.8.9)[1.10.0,1.10.1)
  • H
Improper Input Validation

[2.4.0,2.4.14)[2.6.0,2.6.8)
  • L
Resource Management Errors

[1.4.0,1.6.1]
  • H
Denial of Service (DoS)

[2.4.0,2.4.11)[2.6.0,2.6.5)
  • M
Out-of-Bounds

[,0.99.6]
  • H
Improper Input Validation

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • H
Out-of-bounds Read

[3.2.0,3.2.1)
  • M
Resource Management Errors

[1.4.0,1.4.1]
  • M
Out-of-bounds Read

[3.2.0,3.2.9)[3.4.0,3.4.1)
  • H
Arbitrary Code Injection

[3.2.0,3.2.12)[3.4.0,3.4.4)
  • M
Out-of-Bounds

[,1.12.10)[2.0.0,2.0.2)
  • M
Improper Data Handling

[,1.10.12)[1.12.0,1.12.3)
  • M
Out-of-Bounds

[,1.10.10)[1.12.0,1.12.1)
  • M
Denial of Service (DoS)

[0.9.6,1.0.6]
  • M
Improper Input Validation

[0,2.0.2)
  • M
Improper Input Validation

[0.99.7,1.0.3]
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Denial of Service (DoS)

[,1.8.2)
  • M
Improper Input Validation

[,1.12.13)[2.0.0,2.0.5)
  • M
Resource Management Errors

[,1.10.10)[1.12.0,1.12.1)
  • H
Improper Input Validation

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Improper Input Validation

[0,2.0.1)
  • M
Denial of Service (DoS)

[,1.8.13)[1.10.0,1.10.6)
  • H
Off-by-one Error

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Improper Input Validation

[1.6.0,1.8.6]
  • H
Denial of Service (DoS)

[,1.2.2)
  • M
Improper Input Validation

[0,1.12.9)
  • H
Out-of-bounds Read

[2.4.0,2.4.14)[2.6.0,2.6.8)
  • H
Denial of Service (DoS)

[,2.0.12)[2.2.0,2.2.6)
  • M
Resource Management Errors

[,1.4.12)[1.6.0,1.6.6)
  • M
Resource Management Errors

[,1.12.10)[2.0.0,2.0.2)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • H
Improper Input Validation

[0,2.2.1)
  • M
Denial of Service (DoS)

[0,1.8.6)
  • M
Denial of Service (DoS)

[,1.8.9)[1.10.0,1.10.1)
  • H
Out-of-Bounds

[,1.2.0)
  • M
Out-of-bounds Read

[2.4.0,2.4.12)[2.6.0,2.6.6)
  • H
Denial of Service (DoS)

[0.99.6a,1.2.1]
  • M
Resource Management Errors

[1.0.0,1.4.3]
  • M
Improper Input Validation

[0.8.19,1.0.1]
  • M
Resource Management Errors

[,1.10.11)[1.12.0,1.12.2)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • H
Out-of-Bounds

[,1.6.10)[1.8.0,1.8.2)
  • M
Out-of-Bounds

[,wireshark-1.6.16)[wireshark-1.8.0,wireshark-1.8.8)
  • H
Improper Input Validation

[2.0.0,2.0.11)[2.2.0,2.2.5)
  • H
Out-of-bounds Read

[2.6.0,2.6.15)[3.0.0,3.0.9)[3.2.0,3.2.2)
  • H
Denial of Service (DoS)

[2.0.0,2.0.11)[2.2.0,2.2.5)
  • M
Improper Input Validation

[,1.6.14)[1.8.0,1.8.6)
  • M
Denial of Service (DoS)

[0,0.99.5-1)
  • M
Improper Input Validation

[0,1.12.7)
  • H
Integer Overflow or Wraparound

[,2.0.10)[2.2.0,2.2.4)
  • C
Use of Externally-Controlled Format String

[0.10,0.99.1]
  • M
Out-of-Bounds

[,1.8.9)[1.10.0,1.10.1)
  • H
Denial of Service (DoS)

[0,2.4.2)
  • M
Improper Input Validation

[0,1.12.7)
  • M
Resource Management Errors

[0.8.20,1.2.8]
  • M
Out-of-Bounds

[,1.12.10)[2.0.0,2.0.2)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Improper Input Validation

[,1.8.12)[1.10.0,1.10.4)
  • M
Denial of Service (DoS)

[,1.6.14)[1.8.0,1.8.6)
  • H
CVE-2018-7417

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Information Exposure

[0.9.5,1.0.0]
  • M
Denial of Service (DoS)

[,1.8.7)
  • M
Denial of Service (DoS)

[0,0.99.5-1)
  • M
Resource Management Errors

[,1.0.5)
  • M
Denial of Service (DoS)

[1.2.0,1.2.1]
  • L
Denial of Service (DoS)

[,1.6.14)[1.8.0,1.8.6)
  • M
Improper Input Validation

[,1.6.16)[1.8.0,1.8.8)
  • M
Resource Management Errors

[,1.8.2)
  • M
Improper Input Validation

[0,1.12.9)
  • H
Denial of Service (DoS)

[2.4.0,2.4.6)
  • M
Improper Input Validation

[,1.8.11)[1.10.0,1.10.3)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • C
Out-of-Bounds

[1.2.0,1.4.2]
  • M
Denial of Service (DoS)

[0,1.10.13)
  • M
Out-of-Bounds

[,1.6.15)[1.8.0,1.8.7)
  • M
Denial of Service (DoS)

[,1.10.11)[1.12.0,1.12.2)
  • M
Resource Management Errors

[1.2.0,1.4.4]
  • C
CVE-2009-1266

[,1.0.8)
  • H
Out-of-Bounds

[2.4.0,2.4.16)[2.6.0,2.6.10)[3.0.0,3.0.3)
  • H
Out-of-bounds Write

[2.4.0,2.4.13)[2.6.0,2.6.7)
  • H
Improper Input Validation

[2.2.0,2.2.7)
  • M
Improper Input Validation

[0.9.7,1.0.2]
  • M
Denial of Service (DoS)

[,1.8.7)
  • M
Improper Input Validation

[,1.12.12)[2.0.0,2.0.4)
  • M
Out-of-Bounds

[0,wireshark-1.8.8)
  • M
Denial of Service (DoS)

[,1.10.14)[1.12.0,1.12.5)
  • M
Denial of Service (DoS)

[,1.10.12)[1.12.0,1.12.3)
  • M
Resource Management Errors

[,1.2.17)[1.4.0,1.4.7)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Denial of Service (DoS)

[1.0.0,1.2.0]
  • H
Out-of-Bounds

[0.10.13,1.2.8]
  • H
Resource Management Errors

[,1.10.14)[1.12.0,1.12.5)
  • M
Denial of Service (DoS)

[,1.8.4)
  • M
Denial of Service (DoS)

[,wireshark-1.6.16)[wireshark-1.8.0,wireshark-1.8.8)
  • M
Denial of Service (DoS)

[1.0.6,1.2.0]
  • M
Out-of-bounds Read

[2.4.0,2.4.11)[2.6.0,2.6.5)
  • M
Buffer Overflow

[0,3.4.2)
  • M
Improper Input Validation

[0,2.0.2)
  • H
Denial of Service (DoS)

[,2.0.12)[2.2.0,2.2.6)
  • M
Resource Management Errors

[0,2.0.5)
  • M
Denial of Service (DoS)

[,1.4.13)[1.6.0,1.6.8)
  • M
Resource Management Errors

[,1.12.1)
  • M
Resource Management Errors

[,2.0.8)[2.2.0,2.2.2)
  • M
Improper Input Validation

[,1.4.11)[1.6.0,1.6.5)
  • M
Out-of-Bounds

[0,1.12.9)
  • M
Out-of-Bounds

[,1.12.10)[2.0.0,2.0.2)
  • M
Resource Management Errors

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • H
NULL Pointer Dereference

[2.4.0,2.4.14)[2.6.0,2.6.8)
  • M
Out-of-Bounds

[,1.12.9)[2.0.0,2.0.1)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Denial of Service (DoS)

[,1.6.14)[1.8.0,1.8.6)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Improper Input Validation

[,1.6.12)[1.8.0,1.8.4)
  • H
Denial of Service (DoS)

[,2.0.12)[2.2.0,2.2.6)
  • L
Denial of Service (DoS)

[,1.4.11)[1.6.0,1.6.5)
  • M
Resource Management Errors

[0.9.2,0.99]
  • M
Use of Externally-Controlled Format String

[0.99.8,1.0.5]
  • L
Resource Management Errors

[,1.6.13)[1.8.0,1.8.5)
  • L
Out-of-Bounds

[,1.6.13)[1.8.0,1.8.5)
  • M
Out-of-Bounds

[0,2.0.2)
  • M
Out-of-Bounds

[,1.4.11)[1.6.0,1.6.5)
  • M
Denial of Service (DoS)

[,0.99.2]
  • H
Denial of Service (DoS)

[,2.0.12)[2.2.0,2.2.6)
  • M
Improper Input Validation

[,1.10.2)
  • H
Denial of Service (DoS)

[3.2.0,3.2.15)[3.4.0,3.4.7)
  • M
Denial of Service (DoS)

[,0.99.3]
  • H
CVE-2018-9263

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Denial of Service (DoS)

[0.9.8,0.99.3]
  • C
Out-of-Bounds

[0.9.7,1.0.2]
  • H
Improper Input Validation

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Improper Input Validation

[0,1.12.8)
  • M
Resource Management Errors

[,1.4.13)[1.6.0,1.6.8)
  • H
Denial of Service (DoS)

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • H
Denial Of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • H
NULL Pointer Dereference

[3.0.0,3.0.14)[3.2.0,3.2.7)
  • M
Out-of-Bounds

[,1.12.11)[2.0.0,2.0.3)
  • M
Improper Input Validation

[0,1.10.1)
  • H
Denial of Service (DoS)

[0,1.10.1)
  • H
Memory Leak

[0,2.4.2)
  • M
Resource Management Errors

[,1.2.12)[1.4.0,1.4.1)
  • M
Out-of-Bounds

[,1.2.0]
  • M
Denial of Service (DoS)

[0.99.2,0.99.8]
  • H
Denial of Service (DoS)

[,2.0.12)[2.2.0,2.2.6)
  • M
Improper Input Validation

[0,1.12.7)
  • M
Denial of Service (DoS)

[,1.4.12)[1.6.0,1.6.6)
  • H
Improper Input Validation

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Denial of Service (DoS)

[,1.4.8)[1.6.0,1.6.1)
  • M
Denial of Service (DoS)

[0.7.9,0.99.6]
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • H
Denial of Service (DoS)

[0,2.2.6)
  • M
Out-of-Bounds

[,1.12.9)[2.0.0,2.0.1)
  • M
Denial of Service (DoS)

[0,0.99.5-1)
  • M
Denial of Service (DoS)

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • H
Denial Of Service (DoS)

[0,2.4.2)
  • M
Memory Leak

[3.2.0,3.2.9)[3.4.0,3.4.1)
  • M
Denial of Service (DoS)

[,1.6.14)[1.8.0,1.8.6)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Resource Management Errors

[,1.12.13)[2.0.0,2.0.5)
  • M
Out-of-Bounds

[,1.10.10)[1.12.0,1.12.1)
  • M
Denial of Service (DoS)

[,1.8.4)
  • H
Access Restriction Bypass

[,1.12.10)[2.0.0,2.0.2)
  • M
Improper Input Validation

[,1.8.9)[1.10.0,1.10.1)
  • M
Out-of-Bounds

[0,2.0.6)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • H
NULL Pointer Dereference

[2.4.0,2.4.10)[2.6.0,2.6.4)
  • H
Improper Input Validation

[0,2.6.1)
  • M
Out-of-Bounds

[0,wireshark-1.8.8)
  • M
NULL Pointer Dereference

[,1.12.13)
  • M
Improper Input Validation

[0.9.6,1.0.6]
  • M
Out-of-Bounds

[0,2.0.2)
  • M
Denial of Service (DoS)

[0.7.9,0.99.3]
  • H
Improper Input Validation

[,0.99.5]
  • M
Denial of Service (DoS)

[,0.99.6)
  • M
Improper Input Validation

[0,2.0.2)
  • M
Improper Input Validation

[,1.4.11)[1.6.0,1.6.5)
  • H
Buffer Overflow

[2.6.0,2.6.16)[3.0.0,3.0.10)[3.2.0,3.2.3)
  • H
Denial of Service (DoS)

[2.0.0,2.0.11)[2.2.0,2.2.5)
  • H
Memory Leak

[3.4.0,3.4.3)
  • M
Improper Input Validation

[0,2.0.5)
  • L
Resource Management Errors

[,1.6.13)[1.8.0,1.8.5)
  • M
Resource Management Errors

[1.4.0,1.4.2]
  • H
Integer Overflow or Wraparound

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Denial of Service (DoS)

[0.99.6,1.2.8]
  • H
Resource Management Errors

[,1.12.12)[2.0.0,2.0.4)
  • M
Improper Input Validation

[0.8.16,0.99.6]
  • M
Out-of-Bounds

[0,1.12.5)
  • M
Denial of Service (DoS)

[,1.8.7)
  • M
Improper Input Validation

[,1.10.10)[1.12.0,1.12.1)
  • M
Denial of Service (DoS)

[0,1.10.13)
  • M
Out-of-Bounds

[,1.12.9)[2.0.0,2.0.1)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Resource Management Errors

[,0.99.6]
  • M
Resource Management Errors

[0.6,0.99.7]
  • M
Denial of Service (DoS)

[,0.99.6]
  • M
Denial of Service (DoS)

[0.10.14,0.99.6]
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • H
NULL Pointer Dereference

[,2.2.12)
  • H
Denial of Service (DoS)

[2.0.0,2.0.14)[2.2.0,2.2.8)
  • M
Out-of-bounds Write

[0,2.0.6)
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • H
Out-of-bounds Write

[2.4.0,2.4.11)[2.6.0,2.6.5)
  • M
Access Restriction Bypass

[,0.99.6]
  • L
Denial of Service (DoS)

[,1.8.5)
  • M
Denial of Service (DoS)

[1.2.0,1.2.1]
  • M
Buffer Overflow

[,2.2.7]
  • M
Denial of Service (DoS)

[0.9.8,0.99.6]
  • M
Denial of Service (DoS)

[0,1.10.1)
  • M
Improper Input Validation

[,1.10.10)[1.12.0,1.12.1)
  • M
Denial of Service (DoS)

[,1.6.12)[1.8.0,1.8.4)
  • M
Improper Input Validation

[0,2.0.1)
  • C
Out-of-Bounds

[,0.99.6]
  • M
Improper Input Validation

[,1.4.11)[1.6.0,1.6.5)
  • M
Denial of Service (DoS)

[0.8.20,1.2.8]
  • M
Out-of-Bounds

[,1.4.13)[1.6.0,1.6.8)
  • M
Improper Input Validation

[1.10.12,1.10.14]
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Improper Input Validation

[,1.12.x)[2.0.,2.0.x)
  • M
Out-of-Bounds

[,1.10.9)
  • H
Improper Input Validation

[,2.0.12)[2.2.0,2.2.6)
  • H
Denial of Service (DoS)

[0.99.0,0.99.6]
  • M
Out-of-bounds Read

[0,2.0.4)
  • C
Out-of-Bounds

[0.10.13,1.2.9]
  • M
Divide By Zero

[,1.12.13)[2.0.0,2.0.5)
  • L
Denial of Service (DoS)

[,1.6.13)[1.8.0,1.8.5)
  • M
Resource Management Errors

[0,1.8.6)
  • H
Improper Check for Unusual or Exceptional Conditions

[,2.2.11)[2.4.0,2.4.3)
  • H
Denial of Service (DoS)

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Improper Input Validation

[,1.8.2)
  • M
Information Exposure

[0.9.5,1.0.0]
  • H
Out-of-Bounds

[0,2.6.1)
  • M
CVE-2006-5595

[0.7.9,0.99.3]
  • M
Improper Input Validation

[,1.8.10)[1.10.0,1.10.2)
  • M
Out-of-Bounds

[,1.10.10)[1.12.0,1.12.1)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Improper Access Control

[0,2.0.3)
  • M
Out-of-Bounds

[,1.6.3)
  • M
Improper Input Validation

[,2.0.5)
  • H
Out-of-bounds Read

[2.4.0,2.4.14)[2.6.0,2.6.8)
  • H
Improper Check for Unusual or Exceptional Conditions

[,2.2.11)[2.4.0,2.4.3)
  • M
Improper Input Validation

[,1.8.7)
  • C
Out-of-Bounds

[0.99,0.99.6]
  • M
Improper Input Validation

[0.99.2,1.0.2]
  • M
Out-of-bounds Read

[0,2.0.6)
  • M
Denial of Service (DoS)

[,1.6.14)[1.8.0,1.8.6)
  • M
Buffer Overflow

[,2.2.7]
  • H
Unchecked Return Value

[2.4.0,2.4.8)[2.6.0,2.6.2)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Improper Input Validation

[0,1.12.7)
  • M
Denial of Service (DoS)

[,1.8.10)[1.10.0,1.10.2)
  • M
Out-of-Bounds

[,1.12.10)[2.0.0,2.0.2)
  • H
Out-of-Bounds

[0,2.6.1)
  • M
Resource Management Errors

[,1.2.17)[1.4.0,1.4.7)
  • H
Improper Input Validation

[2.4.0,2.4.6)
  • M
Resource Management Errors

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • M
Resource Management Errors

[,1.8.9)[1.10.0,1.10.1)
  • M
Denial of Service (DoS)

[,1.6.14)[1.8.0,1.8.6)
  • H
Improper Input Validation

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • L
Out-of-Bounds

[,1.6.13)[1.8.0,1.8.5)
  • M
Resource Management Errors

[,0.99.3)
  • M
Improper Input Validation

[0,1.12.11)
  • M
Improper Input Validation

[0,1.12.6)
  • M
NULL Pointer Dereference

[2.4.0,2.4.11)[2.6.0,2.6.5)
  • H
Out-of-Bounds

[1.2.0,1.2.4]
  • M
Improper Input Validation

[0,2.0.1)
  • M
Improper Input Validation

[,1.6.12)[1.8.0,1.8.4)
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Denial of Service (DoS)

[1.2,1.2.1]
  • M
Improper Input Validation

[0,1.12.7)
  • M
Out-of-Bounds

[0,wireshark-1.8.8)
  • H
Improper Input Validation

[0,2.2.1)
  • M
Denial of Service (DoS)

[,1.8.3)
  • M
Out-of-Bounds

[,1.10.9)
  • M
Denial of Service (DoS)

[,0.99.2]
  • H
Denial of Service (DoS)

[0.9.7,0.99.0]
  • M
Resource Management Errors

[0.99.7,1.0.4]
  • M
Out-of-Bounds

[2.2.0,2.2.12)[2.4.0,2.4.4)
  • H
Denial of Service (DoS)

[2.6.0,2.6.20)[3.0.0,3.0.14)[3.2.0,3.2.7)
  • C
Release of Invalid Pointer or Reference

[,2.4.5)
  • M
Resource Management Errors

[,1.10.10)[1.12.0,1.12.1)
  • M
Denial of Service (DoS)

[,1.2.17)[1.4.0,1.4.7)
  • C
Denial of Service (DoS)

[0.10.8,1.2.9]
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • H
NULL Pointer Dereference

[2.2.0,2.2.15)[2.4.0,2.4.7)
  • M
Denial of Service (DoS)

[0.99.2,1.0.6]
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Improper Input Validation

[0,2.2.2)
  • M
Denial of Service (DoS)

[0.10,0.99.5]
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Improper Input Validation

[,1.10.12)[1.12.0,1.12.3)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Out-of-bounds Read

[2.4.0,2.4.11)[2.6.0,2.6.5)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Denial of Service (DoS)

[,1.4.5)
  • M
Double Free

[3.2.0,3.2.6)
  • M
Improper Input Validation

[,1.4.11)[1.6.0,1.6.5)
  • M
SQL Injection

[3.2.0,3.2.13)[3.4.0,3.4.5)
  • H
Denial of Service (DoS)

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • M
Resource Management Errors

[,1.12.13)[2.0.0,2.0.5)
  • M
Denial of Service (DoS)

[0,1.8.6)
  • H
CVE-2018-7334

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • L
Denial of Service (DoS)

[,1.6.13)[1.8.0,1.8.5)
  • M
Improper Input Validation

[0,1.12.7)
  • M
Improper Input Validation

[0,wireshark-1.8.8)
  • H
Denial of Service (DoS)

[0,3.0.1)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • H
Improper Input Validation

[,2.0.14)[2.2.0,2.2.8)
  • M
Improper Input Validation

[,1.12.10)[2.0.0,2.0.2)
  • M
Denial of Service (DoS)

[,1.6.12)[1.8.0,1.8.4)
  • M
Denial of Service (DoS)

[1.2.2,1.2.9]
  • M
Denial of Service (DoS)

[0.6,0.99.6]
  • M
Out-of-Bounds

[,1.10.11)[1.12.0,1.12.2)
  • M
Improper Input Validation

[,1.12.12)[2.0.0,2.0.4)
  • M
Resource Management Errors

[0.10.3,1.0.3]
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • H
Denial of Service (DoS)

[0,1.8.6)
  • M
Memory Leak

[0,3.4.1)
  • H
Improper Input Validation

[,2.0.15)[2.2.0,2.2.9)[2.4.0,2.4.1)
  • M
Denial of Service (DoS)

[0,1.10.7)
  • H
Improper Input Validation

[2.0.0,2.0.11)[2.2.0,2.2.5)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • H
Denial of Service (DoS)

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Improper Input Validation

[,1.6.2)
  • M
Improper Input Validation

[,1.8.10)[1.10.0,1.10.2)
  • M
Improper Input Validation

[1.2,1.2.9]
  • M
Out-of-Bounds

[0,wireshark-1.8.8)
  • M
Improper Input Validation

[0,1.12.7)
  • M
Use of a Risky Cryptographic Algorithm

[2.4.0,2.4.12)[2.6.0,2.6.6)
  • H
Improper Input Validation

[2.2.0,2.2.15)[2.4.0,2.4.7)
  • M
Improper Input Validation

[,1.8.13)[1.10.0,1.10.6)
  • H
Denial of Service (DoS)

[3.4.0,3.4.3)
  • M
Improper Input Validation

[,1.12.12)[2.0.0,2.0.4)
  • H
CVE-2018-7320

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • H
Out-of-Bounds

[1.2.0,1.4.1]
  • M
Access Restriction Bypass

[,1.8.10)[1.10.0,1.10.2)
  • M
Out-of-Bounds

[0,1.10.6)
  • M
Out-of-Bounds

[,1.8.12)[1.10.0,1.10.4)
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Denial of Service (DoS)

[0.10.2,1.2.2]
  • M
Out-of-Bounds

[,1.10.9)
  • H
Buffer Overflow

[2.6.0,2.6.17)[3.0.0,3.0.11)[3.2.0,3.2.4)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Improper Input Validation

[,1.8.9)[1.10.0,1.10.1)
  • M
Improper Input Validation

[0,1.12.4)
  • M
Improper Input Validation

[0,2.0.1)
  • M
Improper Input Validation

[0,1.12.9)
  • H
Memory Leak

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Resource Management Errors

[1.0,1.4.3]
  • M
Resource Management Errors

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • M
Out-of-Bounds

[,1.6.2)
  • M
Improper Input Validation

[0.9.5,1.0.0]
  • M
Improper Input Validation

[2.4.0,2.4.12)[2.6.0,2.6.6)
  • M
Resource Management Errors

[0,2.0.2)
  • H
Out-of-bounds Read

[2.2.0,2.2.15)[2.4.0,2.4.7)
  • M
Improper Input Validation

[0,2.0.1)
  • M
Out-of-Bounds

[1.2.0,1.4.3]
  • M
Improper Input Validation

[0,1.10.1)
  • H
Denial of Service (DoS)

[,3.2.8)
  • H
Denial of Service (DoS)

[3.2.0,3.2.5)
  • H
Improper Input Validation

[2.0.0,2.0.14)[2.2.0,2.2.8)
  • M
Denial of Service (DoS)

[2.0.0,2.0.12)[2.2.0,2.2.6)
  • H
NULL Pointer Dereference

[2.2.0,2.2.15)[2.4.0,2.4.7)
  • H
Out-of-Bounds

[2.2.0,2.2.15)[2.4.0,2.4.7)
  • M
Improper Input Validation

[2.6.0,2.6.6)
  • M
Out-of-Bounds

[,1.12.11)[2.0.0,2.0.3)
  • M
Denial of Service (DoS)

[0.10.4,0.99.2]
  • C
Use of Externally-Controlled Format String

[,1.0.6)
  • M
Out-of-Bounds

[,1.12.x)[2.0.,2.0.x)
  • M
Resource Management Errors

[0,1.10.1)
  • M
Denial of Service (DoS)

[0,1.12.4)
  • M
Out-of-Bounds

[,1.10.9)
  • M
Out-of-Bounds

[,1.10.10)[1.12.0,1.12.1)
  • H
NULL Pointer Dereference

[2.4.0,2.4.13)[2.6.0,2.6.7)
  • H
Divide By Zero

[2.6.0,2.6.5)
  • M
Improper Input Validation

[0,2.0.2)
  • M
Denial of Service (DoS)

[0.6,0.99.7]
  • M
Improper Input Validation

[0.9.6,1.2.7]
  • H
Out-of-bounds Write

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Improper Input Validation

[0.99.6a,1.0.2]
  • H
Missing Initialization of Resource

[2.6.0,2.6.13)[3.0.0,3.0.7)
  • H
NULL Pointer Dereference

[3.2.0,3.2.2)
  • H
NULL Pointer Dereference

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Code

[,1.10.14)[1.12.0,1.12.5)
  • M
Resource Management Errors

[,1.8.3)
  • M
Denial of Service (DoS)

[,1.6.12)[1.8.0,1.8.4)
  • M
Improper Input Validation

[0,2.0.1)
  • M
Resource Management Errors

[,1.6.3)
  • M
Use After Free

[,2.0.8)[2.2.0,2.2.2)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Out-of-Bounds

[0,2.0.2)
  • M
Out-of-Bounds

[,1.8.2)
  • H
CVE-2011-3360

[,1.4.9)[1.6.0,1.6.2)
  • M
Denial of Service (DoS)

[0,1.10.10)
  • M
Improper Input Validation

[0,1.12.9)
  • H
Out-of-Bounds

[,1.4.2]
  • M
Remote Code Execution (RCE)

[,1.6.6)
  • M
Out-of-Bounds

[,1.4.13)[1.6.0,1.6.8)
  • M
Denial of Service (DoS)

[0,1.10.1)
  • H
Out-of-bounds Read

[,2.2.12)
  • H
NULL Pointer Dereference

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • H
Use After Free

[2.2.0,2.2.15)[2.4.0,2.4.7)
  • M
Out-of-Bounds

[2.2.0,2.2.12)[2.4.0,2.4.4)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Denial of Service (DoS)

[1.2.0,1.2.4]
  • M
Denial of Service (DoS)

[,1.4.13)[1.6.0,1.6.8)
  • M
Out-of-Bounds

[,1.8.10)[1.10.0,1.10.2)
  • H
Denial of Service (DoS)

[,0.99.6]
  • H
Arbitrary Code Execution

[,1.2.11)
  • H
Resource Management Errors

[0,1.12.5)
  • H
Improper Check for Unusual or Exceptional Conditions

[,2.2.11)[2.4.0,2.4.3)
  • H
NULL Pointer Dereference

[2.4.0,2.4.13)[2.6.0,2.6.7)
  • M
Denial of Service (DoS)

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • H
Out-of-bounds Write

[,2.2.9)[2.4.0,2.4.1)
  • H
CVE-2018-16057

[2.2.0,2.2.17)[2.4.0,2.4.9)[2.6.0,2.6.3)
  • M
Out-of-Bounds

[0,2.0.6)
  • H
Out-of-bounds Read

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Resource Management Errors

[,1.8.10)[1.10.0,1.10.2)
  • H
Improper Initialization

[2.2.0,2.2.17)[2.4.0,2.4.9)[2.6.0,2.6.3)
  • M
Out-of-Bounds

[,1.12.11)[2.0.0,2.0.3)
  • H
Unchecked Return Value

[0,3.0.1)
  • H
Buffer Overflow

[2.4.0,2.4.15)[2.6.0,2.6.9)[3.0.0,3.0.2)
  • H
Denial of Service (DoS)

[2.6.0,2.6.11)[3.0.0,3.0.4)
  • H
Denial of Service (DoS)

[,2.2.5)
  • M
Resource Management Errors

[1.6.0,1.8.2]
  • M
Resource Management Errors

[0.99.7,1.0.3]
  • M
Denial of Service (DoS)

[,1.8.4)
  • M
Improper Input Validation

[,1.12.9)[2.0.0,2.0.1)
  • M
Resource Management Errors

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • M
Out-of-Bounds

[0,wireshark-1.8.8)
  • M
Out-of-Bounds

[,1.10.12)[1.12.0,1.12.3)
  • H
Integer Overflow or Wraparound

[,2.0.10)[2.2.0,2.2.4)
  • M
Out-of-Bounds

[,1.8.9)[1.10.0,1.10.1)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Improper Input Validation

[0,1.12.7)
  • M
Improper Input Validation

[0,1.10.4)
  • H
NULL Pointer Dereference

[0,2.4.1)
  • M
Denial of Service (DoS)

[,1.2.17)[1.4.0,1.4.7)
  • H
Improper Input Validation

[2.2.0,2.2.14)[2.4.0,2.4.6)
  • M
Denial of Service (DoS)

[0.9.2,1.2.4]
  • M
Out-of-Bounds

[,1.12.5)
  • H
Denial of Service (DoS)

[,1.8.7)
  • H
Denial of Service (DoS)

[0,1.12.5)
  • M
Improper Input Validation

[0,2.0.1)
  • M
Resource Management Errors

[,1.6.2)
  • M
Improper Input Validation

[,2.0.8)[2.2.0,2.2.2)
  • H
Denial of Service (DoS)

[,1.8.9)[1.10.0,1.10.1)
  • H
CVE-2018-7418

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • L
Remote Code Execution (RCE)

[,1.4.14)[1.6.0,1.6.9)[1.8.0,1.8.1)
  • H
CVE-2018-7335

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Denial of Service (DoS)

[,1.4.15)[1.6.0,1.6.10)[1.8.0,1.8.2)
  • H
CVE-2018-16056

[2.2.0,2.2.17)[2.4.0,2.4.9)[2.6.0,2.6.3)
  • M
Denial of Service (DoS)

[,0.99.6)
  • M
Denial of Service (DoS)

[0,1.8.6)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • L
Improper Input Validation

[,1.6.13)[1.8.0,1.8.5)
  • M
Use After Free

[2.4.0,2.4.12)
  • M
Improper Input Validation

[,1.8.11)[1.10.0,1.10.3)
  • H
Denial of Service (DoS)

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • H
Denial of Service (DoS)

[2.0.0,2.0.11)[2.2.0,2.2.5)
  • H
Divide By Zero

[2.0.0,2.0.13)[2.2.0,2.2.7)
  • M
Improper Input Validation

[0,1.12.9)
  • H
Out-of-bounds Read

[2.2.0,2.2.16)[2.4.0,2.4.8)[2.6.0,2.6.2)
  • M
Information Exposure

[0.9.5,1.0.0]
  • M
Resource Management Errors

[,1.4.12)[1.6.0,1.6.6)
  • M
Resource Management Errors

[0,1.10.1)
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Resource Management Errors

[0.99.2,1.0.3]
  • M
Resource Management Errors

[,1.2.16)[1.4.0,1.4.5)
  • M
Out-of-Bounds

[0.99.7,1.0.5]
  • M
Denial of Service (DoS)

[,1.10.12)[1.12.0,1.12.3)
  • M
Denial of Service (DoS)

[,1.6.12)[1.8.0,1.8.4)
  • M
Denial of Service (DoS)

[,1.6.14)[1.8.0,1.8.6)
  • H
Out-of-Bounds

[,1.8.13)[1.10.0,1.10.6)
  • M
Denial of Service (DoS)

[,1.4.5]
  • H
Denial of Service (DoS)

[2.2.0,2.2.13)[2.4.0,2.4.5)
  • M
Denial of Service (DoS)

[,1.2.0]
  • M
Denial of Service (DoS)

[,1.8.4)
  • H
Improper Input Validation

[,2.6.3)
  • H
Improper Input Validation

[2.0.0,2.0.11)[2.2.0,2.2.5)