All 138 CVE vulnerabilities found in Wireshark, with AI-generated Chinese analysis, references, and POCs.
This page presents a comprehensive aggregation of security vulnerabilities associated with Wireshark, a widely used network protocol analyzer. It focuses on common weakness enumerations affecting the vendor’s software suite, providing a centralized view of known security flaws. The collection includes various types of vulnerabilities such as buffer overflows, input validation errors, and logic flaws that could potentially lead to remote code execution or denial of service attacks. The data covers vulnerabilities disclosed from the earliest public records up to the most recent advisories, ensuring a historical perspective on the product’s security posture. This time range allows users to analyze trends in vulnerability discovery and patching responses over several years. Visitors to this page can track Wireshark vendor advisories to stay informed about critical updates and mitigation strategies. Users can also gain a deeper understanding of specific weakness classes by examining how they manifest within the context of network analysis tools. Additionally, the page facilitates looking up the complete vulnerability history of Wireshark, helping security professionals assess risk levels and prioritize remediation efforts based on past incidents. By consolidating these details, the resource supports informed decision-making for administrators and developers managing systems that rely on this software. This approach ensures that stakeholders have access to accurate and up-to-date information necessary for maintaining robust security defenses.
Vendor: Wireshark Foundation
All 138 known CVE vulnerabilities affecting Wireshark with full Chinese analysis, references, and POCs where available.