Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-dwrr-3qqb-ekfu
Vulnerability ID VCID-dwrr-3qqb-ekfu
Aliases CVE-2011-3360
Summary Multiple vulnerabilities in Wireshark allow for the remote execution of arbitrary code, or a Denial of Service condition.
Status Published
Exploitability 2.0
Weighted Severity 0.6
Risk 1.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added Nov. 19, 2011
Description Wireshark - console.lua pre-loading (Metasploit)
Ransomware campaign use Known
Source publication date Nov. 19, 2011
Exploit type remote
Platform windows
Source update date Nov. 19, 2011
Source URL http://technet.microsoft.com/en-us/security/advisory/2269637
Data source Metasploit
Description This module exploits a vulnerability in Wireshark 1.6 or less. When opening a pcap file, Wireshark will actually check if there's a 'console.lua' file in the same directory, and then parse/execute the script if found. Versions affected by this vulnerability: 1.6.0 to 1.6.1, 1.4.0 to 1.4.8
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date July 18, 2011
Platform Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/misc/wireshark_lua.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.98494
EPSS Score 0.65771
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:01:11.567582+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201110-02 38.0.0