Browse all 128 CVE security advisories affecting Wireshark Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.
The Wireshark Foundation oversees the development and maintenance of Wireshark, the world’s most widely used network protocol analyzer. Primarily utilized by security professionals, network administrators, and law enforcement for traffic analysis and troubleshooting, the software captures and inspects data packets in real-time. Historically, its codebase has exhibited vulnerabilities ranging from buffer overflows and integer overflows to use-after-free errors, with several instances allowing remote code execution or denial of service. While the application itself is robust, the sheer volume of parsed protocols creates a large attack surface, leading to the current record of 128 Common Vulnerabilities and Exposures. Notable incidents have included critical flaws in dissectors for protocols like SMB and HTTP, which could be triggered by maliciously crafted network traffic. The Foundation actively addresses these issues through regular updates, emphasizing the importance of keeping the tool patched to mitigate risks associated with its deep packet inspection capabilities.
This page lists every published CVE security advisory associated with Wireshark Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.