[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:24519
The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which improperly refers to previously processed bytes. Successful exploitation allows remote attackers to cause a denial of serv ...

oval:org.secpod.oval:def:24520
The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to multiple memory leak vulnerabilities. The flaws are present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (mem ...

oval:org.secpod.oval:def:24525
The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which interprets a zero value as a length rather than an error condition. Successful exploitation allows remote attackers to cau ...

oval:org.secpod.oval:def:17101
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly validate MAC addresses. Successful exploitation allows attackers to cause a denial of service via a crafted packet.

oval:org.secpod.oval:def:17099
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in wireshark, which does not validate a certain length v ...

oval:org.secpod.oval:def:17105
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, what does not properly validate certain index values. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:17104
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in wireshark, which fails to handle a crafted packet. Successful exploitation allows ...

oval:org.secpod.oval:def:17103
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in wireshark, which fails to properly determine whether there is remaining packet data to pr ...

oval:org.secpod.oval:def:17102
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark, which fails to handle a crafted packet. Successful expl ...

oval:org.secpod.oval:def:17054
The host is installed with Wireshark 1.10.0 before 1.10.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark crash by injecting a malfor ...

oval:org.secpod.oval:def:17106
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to memory consumption vulnerability. A flaw is present in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector, which fails to handle a crafted packet. Succ ...

oval:org.secpod.oval:def:17107
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to double free vulnerability. A flaw is present in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector, which fails to handle a crafted packet. Successful ...

oval:org.secpod.oval:def:17108
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector, which fails to handle a crafted packet. Successful exploitation allo ...

oval:org.secpod.oval:def:17109
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the P1 dissector, which does not properly initialize a global variable. Successful exploitation allows attackers to cause a denial of service (crash).

oval:org.secpod.oval:def:19984
The host is installed with Wireshark 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet-trace file that includes a large packet. Successful exploitation allows attackers to execute arbitrary code or cause ...

oval:org.secpod.oval:def:16431
The host is installed with Wireshark 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly relies on a global variable. Successful exploitation allows attackers to cause application crash via a crafted packet.

oval:org.secpod.oval:def:16432
The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long domain name in a packet. Successful exploitation allows attackers to cause application cra ...

oval:org.secpod.oval:def:14852
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to terminate packet-data processing after finding zero remaining bytes. Successful exploitation allows attackers to cause ...

oval:org.secpod.oval:def:14846
Wireshark 1.10.x (32 bit) is installed

oval:org.secpod.oval:def:15597
The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash.

oval:org.secpod.oval:def:16005
The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the epan/dissectors/packet-tcp.c in the TCP dissector, which does not properly determine the amount of remaining data. Successful exploitation allo ...

oval:org.secpod.oval:def:15595
The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash.

oval:org.secpod.oval:def:16008
The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to unspecified vulnerability. The flaw is present in the in the NBAP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (applicat ...

oval:org.secpod.oval:def:16009
The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to spoofing vulnerability. The flaw is present in the ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissecto, which fails to properly handle a crafted packet. Succe ...

oval:org.secpod.oval:def:16006
The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector, which fails to properly handle a crafted packet. ...

oval:org.secpod.oval:def:16007
The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector, which fails to properly initialize a data structure. Successf ...

oval:org.secpod.oval:def:15593
The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to restrict the dch_id value. Successful exploitation allows attackers to cause application crash.

oval:org.secpod.oval:def:15594
The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash.

oval:org.secpod.oval:def:15592
The host is installed with Wireshark 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly maintain a certain free list. Successful exploitation allows attackers to cause application crash.

oval:org.secpod.oval:def:32528
The host is installed with Wireshark 1.10.12 through 1.10.14 and is prone to a denial of service vulnerability. A flaw is present in the application, which mishandles a certain strdup return value. Successful exploitation could allow attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:17053
The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ...

oval:org.secpod.oval:def:21736
The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:21737
The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (a ...

oval:org.secpod.oval:def:21735
The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (i ...

oval:org.secpod.oval:def:21738
The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to multiple integer overflow vulnerabilities. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:21739
The host is installed with Wireshark 1.10.x before 1.10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read and application c ...

oval:org.secpod.oval:def:20698
The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly validate padding values. Successful exploitation allows remote attackers to cause a denial of service (buffer underflow and applica ...

oval:org.secpod.oval:def:20702
The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly strip '\n' characters. Successful exploitation allows remote attackers to cause a denial of service (buffer underflow and applicati ...

oval:org.secpod.oval:def:20700
The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not completely initialize a certain buffer. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:20701
The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly strip '\n' and '\r' characters. Successful exploitation allows remote attackers to cause a denial of service (off-by-one buffer und ...

oval:org.secpod.oval:def:20699
The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:19985
The host is installed with Wireshark 1.10.x before 1.10.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:19895
The host is installed with Wireshark 1.10.x before 1.10.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation could allow attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:21204
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer. Su ...

oval:org.secpod.oval:def:21205
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to prevent data overwrites during copy operations. Successful exploitation could allow attackers to crash the servic ...

oval:org.secpod.oval:def:21202
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle empty input data. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:14115
The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ...

oval:org.secpod.oval:def:21203
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate bitmask data. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:17100
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark, which fails to properly handle a cr ...

oval:org.secpod.oval:def:21200
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to an off-by-one error vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet that triggers parsing of a token located one position beyond the current positio ...

oval:org.secpod.oval:def:21201
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain ID value. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:16433
The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to check for empty lines. Successful exploitation allows attackers to cause infinite loop via a crafted packet.

oval:org.secpod.oval:def:14850
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to multiple array index error vulnerabilities. The flaws are present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:14851
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:14847
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to initialize a length field in certain abnormal situations. Successful exploitation allows attackers to cause an applica ...

oval:org.secpod.oval:def:21196
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the MEGACO dissector in Wireshark, which fails to handle an empty line. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:21197
The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which refers to incorrect offset and start variables. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:14848
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to initialize certain structure members. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:21194
The host is installed with Wireshark 1.10.x before 1.10.10 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation could allow attackers to split memory ownership between the SDP and RTP dissectors.

oval:org.secpod.oval:def:14849
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:21195
The host is installed with Wireshark 1.10.x before 1.10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet to the RTP dissector. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:15596
The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to enter a certain loop. Successful exploitation allows attackers to cause application crash.

oval:org.secpod.oval:def:17052
The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to execute malicious cod ...

oval:org.secpod.oval:def:17055
The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ...

*CPE
cpe:/a:wireshark:wireshark:1.10::x86

© SecPod Technologies