Known vulnerabilities in Wireshark.org Wireshark 2.0.9
4.4.13
4.6.3
4.4.12
4.6.2
4.6.1
4.6.0
4.4.11
4.2.14
4.4.10
4.4.9
4.2.13
4.4.8
4.4.7
4.2.12
4.4.6
4.4.5
4.4.4
4.2.11
4.4.3
4.2.10
4.4.2
4.2.9
4.4.1
4.2.8
4.4.0
4.2.7
4.0.17
4.0.16
4.2.6
3.6.24
4.2.5
4.0.15
3.6.23
4.2.4
4.0.14
3.6.22
4.2.3
4.0.13
3.6.21
4.2.2
4.2.1
4.0.12
3.6.20
4.2.0
4.0.11
3.6.19
4.0.10
3.6.18
4.0.9
3.6.17
4.0.8
3.6.16
4.0.7
3.6.15
4.0.6
3.6.14
4.0.5
3.6.13
4.0.4
3.6.12
4.0.3
3.6.11
4.0.2
3.6.10
4.0.1
3.6.9
4.0.0
3.6.8
3.4.16
3.6.7
3.4.15
3.6.6
3.6.5
3.6.4
3.4.14
3.6.3
3.4.13
3.6.2
3.4.12
3.6.1
3.4.11
3.6.0
3.4.10
3.2.18
3.2.17
3.4.9
3.2.16
3.4.8
3.2.15
3.4.7
3.2.14
3.4.6
3.2.13
3.4.5
3.2.12
3.4.4
3.4.3
3.2.11
3.4.2
3.2.10
3.4.1
3.2.9
3.2.8
3.4.0
2.6.20
3.0.14
3.2.7
2.6.19
3.0.13
3.2.6
12.1
12.3
12.2
11.4
7.0
13.2
13.1
11.2
8.0
11.3
2.6.18
3.0.12
3.2.5
2.6.17
3.0.11
3.2.4
2.6.16
3.0.10
3.2.3
2.6.15
3.0.9
3.2.2
2.6.14
3.0.8
3.2.1
3.2.0
2.6.13
3.0.7
2.6.12
3.0.6
3.0.5
2.6.11
3.0.4
2.4.16
2.6.10
3.0.3
2.4.15
2.6.9
3.0.2
3.0.1
3.0.0
2.6.8
2.6.7
2.5.0
2.4.14
2.4.13
1.4.15
1.2.18
2.4.12
2.6.6
2.4.11
2.6.5
2.6.4
2.4.10
2.2.17
2.4.9
2.6.3
2.2.16
2.4.8
2.6.2
2.2.15
2.4.7
2.6.1
2.6.0
2.4.6
2.2.14
2.2.13
2.4.5
2.2
2.2.12
2.4.4
2.4.3
2.2.11
2.1.1
2.1.0
1.99.9
1.99.8
1.99.7
1.99.6
1.99.5
1.99.4
1.99.3
1.99.2
1.99.1
1.99.0
1.12.13
1.11.3
1.11.2
1.11.1
1.11.0
1.9.2
1.9.1
1.9.0
1.8.15
1.8.14
1.8.13
1.7.1
1.7.0
1.6.16
1.5.1
2.0.16
2.0.15
2.2.10
2.4.2
2.4.1
2.2.9
2.2.8
2.0.14
2.4.0
2.2.7
2.0.13
2.0.12
2.0.11
2.0.10
2.0.9
2.0.8
2.0.7
2.0.6
2.0.5
2.2.6
2.2.5
2.2.4
2.2.3
2.2.2
2.2.1
2.2.0
1.12.12
2.0.4
1.12.11
2.0.3
1.12.10
2.0.2
1.12.9
2.0.1
2.0.0
1.12.8
1.12.7
1.12.6
1.12.5
1.12.4
1.10.14
1.10.13
1.10.12
1.12.3
1.10.11
1.12.2
1.10.10
1.12.1
1.12.0
1.10.9
1.10.8
1.10.7
1.10.6
1.10.4
1.10.5
1.8.12
1.10.3
1.8.11
1.10.2
1.8.10
1.8.9
1.10.1
1.10
1.8.8
1.10.0
1.6.15
1.8.7
1.6.14
1.8.6
1.6.13
1.8.5
1.8.4
1.6.12
1.6.11
1.8.3
1.4.14
1.8.1
1.8.2
1.8.0
1.6.9
1.6.10
1.6.8
1.6.6
1.4.12
1.6.7
1.4.13
1.4.11
1.6.5
1.6.3
1.4.10
1.6.4
1.4.9
1.6.2
1.4.8
1.6.1
1.4.7
1.2.17
1.6.0
1.2.16
1.4.6
1.4.5
1.2.15
1.4.4
1.2.14
1.5.0
1.4.3
1.2.13
1.0.16
1.0.15
1.4.2
1.2.12
1.4.1
1.2.11
1.4.0
1.2.10
1.0.14
1.2.9
1.0.13
1.2.8
1.0.12
1.0.11
1.2.6
1.2.7
1.0.10
1.2.5
1.2.3
1.2.4
1.2.2
1.2
0.99.9
1.2.1
1.0.9
1.0.8
1.2.0
1.0.7
1.0.6
1.0.5
1.0.4
1.0.3
1.0.2
0.99.6a
1.0.1
1.0
1.0.0
0.99.8
0.99.7
0.8.19
0.6
0.8.20
0.99.6
0.10.10
0.10.1
0.99.5
0.10.6
0.10.3
0.10.7
0.10.8
0.10.5
0.10.9
0.10.2
0.99.4
0.8.16
0.7.9
0.99.3
0.99.2
0.9.2
0.9.14
0.9.15
0.9.10
0.9.6
0.9.5
0.9.8
0.9.7
0.10.4
0.10
0.99.1
0.10.14
0.10.12
0.10.13
0.10.11
0.99
0.99.0
Security bulletins (12)
| Secuity bulletin | Severity | Status | Published |
|---|---|---|---|
| SB2018020722: Denial of service in Wireshark | Low | 07.02.2018 | |
| SB2017110306: Denial of service in Wireshark | Low | 03.11.2017 | |
| SB2017090401: Multiple vulnerabilities in Wireshark | Low | 04.09.2017 | |
| SB2017071823: Multiple vulnerabilities in Wireshark | Medium | 18.07.2017 | |
| SB2017060602: Multiple vulnerabilities in Wireshark | Low | 06.06.2017 | |
| SB2017041303: Infinite loop in Wireshark | Medium | 13.04.2017 | |
| SB2017041304: Infinite loop in Wireshark | Medium | 13.04.2017 | |
| SB2017041305: Improper Neutralization of Special Elements in Output Used by a Downstream Component in Wireshark | Medium | 13.04.2017 | |
| SB2017041307: Infinite loop in Wireshark | Medium | 13.04.2017 | |
| SB2017041316: Multiple vulnerabilities in Wireshark | Medium | 13.04.2017 | |
| SB2017012509: Integer overflow in Wireshark | Medium | 25.01.2017 | |
| SB2017012510: Integer overflow in Wireshark | Medium | 25.01.2017 |