[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:46073
The host is installed with Wireshark 2.0.x or 2.2.x with USPBcap component 1.1.0.0 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the USPBcap component issue. Successful exploitation allows attackers to gain elevated p ...

oval:org.secpod.oval:def:36977
Wireshark (32 bit) 2.2.x series is installed

oval:org.secpod.oval:def:42402
The host is installed with Wireshark 2.0.x before 2.0.16, 2.2.x before 2.2.10 or 2.4.x before 2.4.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attack ...

oval:org.secpod.oval:def:42401
The host is installed with Wireshark 2.2.x before 2.2.10 or 2.4.x before 2.4.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:42400
The host is installed with Wireshark 2.2.x before 2.2.10 or 2.4.x before 2.4.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:43534
The host is installed with Wireshark 2.4.0 to 2.4.3 or 2.2.0 to 2.2.11 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle exceptional conditions. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:43533
The host is installed with Wireshark 2.4.0 to 2.4.3 or 2.2.0 to 2.2.11 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the WCP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:43532
The host is installed with Wireshark 2.4.0 to 2.4.3 or 2.2.0 to 2.2.11 and is prone to multiple denial of service vulnerabilities. The flaws are present in the application, which fails to properly handle the JSON, XML, NTP, XMPP, and GDB dissector issues. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:43029
The host is installed with Wireshark 2.4.0 to 2.4.2 or 2.2.0 to 2.2.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the NetBIOS dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:43028
The host is installed with Wireshark 2.4.0 to 2.4.2 or 2.2.0 to 2.2.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IWARP_MPA dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:43027
The host is installed with Wireshark 2.4.0 to 2.4.2 or 2.2.0 to 2.2.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the CIP Safety dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:39861
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40674
The host is installed with Wireshark 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv6 address. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39862
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40675
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:39863
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39105
The host is installed with Wireshark 2.2.x before 2.2.5 or 2.0.x before 2.0.11 and is prone to memory corruption vulnerability. A flaw is present in the capture file support (libwiretap) component, which fails to properly handle a crafted or malformed STANAG 4607 capture file. Successful exploitatio ...

oval:org.secpod.oval:def:39864
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40673
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv4 address. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39865
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40678
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:39866
The host is installed with Wireshark 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers to cause a DOF dissecto ...

oval:org.secpod.oval:def:40679
The host is installed with Wireshark 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted size value. Successful exploitation could allow remote attackers to read past the end of a buffer.

oval:org.secpod.oval:def:40676
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the Vendor Class Identifier. Successful exploitation could allow remote attackers to read past the end ...

oval:org.secpod.oval:def:40677
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check for a negative length. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40681
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:40682
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly detect self-referencing pointers. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40680
The host is installed with Wireshark 2.2.x before 2.2.7 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a crafted OID. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40683
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate an interval value. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40684
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a NULL pointer. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41385
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41386
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41141
The host is installed with Wireshark 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle exceptions. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41142
The host is installed with Wireshark 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain types of packets. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41384
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:38112
The host is installed with Wireshark 2.2.x before 2.2.2 and is prone to an unspecified vulnerability. A flaw is present in the I/O dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allows attackers to cause unspecified impact.

oval:org.secpod.oval:def:41389
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the relationships between indexes and lengths. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:38113
The host is installed with Wireshark 2.2.x before 2.2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle NCP dissector. Successful exploitation allows attackers to crash the service by injecting a malformed packet onto the wire o ...

oval:org.secpod.oval:def:38872
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the DHCPv6 dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the appl ...

oval:org.secpod.oval:def:38114
The host is installed with Wireshark 2.2.x before 2.2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle bluetooth L2CAP dissector. Successful exploitation allows attackers to crash the service by injecting a malformed packet ont ...

oval:org.secpod.oval:def:38873
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the ASTERIX dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the app ...

oval:org.secpod.oval:def:41146
The host is installed with Wireshark 2.2.7 and is prone to a stack exhaustion vulnerability. A flaw is present in the application, which fails to properly handle a high recursion depth. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41388
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle length validation. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38110
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the AllJoyn dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:38111
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an use-after-free vulnerability. A flaw is present in the DCERPC dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service wit ...

oval:org.secpod.oval:def:38109
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an unspecified vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service by f ...

oval:org.secpod.oval:def:41830
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the servic ...

oval:org.secpod.oval:def:41833
The host is installed with Wireshark 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38108
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:41835
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39940
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39937
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39938
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39939
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:43368
The host is installed with Wireshark 2.2.x through 2.2.11 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly validate an IPv4 address. Successful exploitation could allow remote attackers to produce unknown impact.

oval:org.secpod.oval:def:44399
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the SIGCOMP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44400
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IPMI dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44402
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the FCP protocol dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44403
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 802.11 dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44404
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the UMTS MAC dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44405
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-rpcrdma.c issue. Successful exploitation allows attackers to cause an application cr ...

oval:org.secpod.oval:def:44406
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-reload.c issue. Successful exploitation allows attackers to cause an application cra ...

oval:org.secpod.oval:def:44407
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-ber.c issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44408
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-thread.c issue. Successful exploitation allows attackers to cause an application cra ...

oval:org.secpod.oval:def:44409
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-s7comm.c issue. Successful exploitation allows attackers to cause an application cra ...

oval:org.secpod.oval:def:44410
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-usb.c issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44411
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-openflow_v6.c issue. Successful exploitation allows attackers to cause an applicatio ...

oval:org.secpod.oval:def:44412
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-lltd.c issue. Successful exploitation allows attackers to cause an application crash ...

oval:org.secpod.oval:def:44413
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-rpki-rtr.c issue. Successful exploitation allows attackers to cause an application c ...

oval:org.secpod.oval:def:44414
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-sccp.c issue. Successful exploitation allows attackers to cause an application crash ...

oval:org.secpod.oval:def:44415
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-wccp.c issue. Successful exploitation allows attackers to cause an application crash ...

oval:org.secpod.oval:def:44416
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-dcm.c issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44417
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-thrift.c issue. Successful exploitation allows attackers to cause an application cra ...

oval:org.secpod.oval:def:44418
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the SIGCOMP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44419
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the DMP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44420
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the pcapng file parser issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44421
The host is installed with Wireshark 2.4.0 to 2.4.4 or 2.2.0 to 2.2.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the NBAP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44869
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the LWAPP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44872
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the MP4 dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44873
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 802.15.4 dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44874
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the NBAP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44875
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the VLAN dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44876
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Kerberos dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44877
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the ADB dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:44878
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-tn3270.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44879
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-isup.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44880
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-lapd.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44881
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-smb2.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44882
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-giop.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44883
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/oids.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44884
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-multipart.c issue. Successful exploitation allows attackers to cause a memory leak ...

oval:org.secpod.oval:def:44885
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-h223.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44886
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-pcp.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:44887
The host is installed with Wireshark 2.4.0 to 2.4.5 or 2.2.0 to 2.2.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the ui/failure_message.c issue. Successful exploitation allows attackers to cause a memory leak.

oval:org.secpod.oval:def:45711
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the LWAPP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45713
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the GSM A DTAP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45714
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RRC dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45715
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Q.931 dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45716
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the LTP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45717
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the DNS dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:46722
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the MMSE dissector issue. Successful exploitation allows attackers to cause an application cr ...

oval:org.secpod.oval:def:46723
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in dissectors that support zlib decompression. Successful exploitation allows atta ...

oval:org.secpod.oval:def:46724
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the DICOM dissector issue. Successful exploitation allows attackers to cause an application c ...

oval:org.secpod.oval:def:46725
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the BGP protocol dissector issue. Successful exploitation allows attackers to cause an applic ...

oval:org.secpod.oval:def:46726
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ASN.1 BER dissector issue. Successful exploitation allows attackers to cause an applicati ...

oval:org.secpod.oval:def:46727
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ISMP dissector issue. Successful exploitation allows attackers to cause an application cr ...

oval:org.secpod.oval:def:46729
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Bazaar protocol dissector issue. Successful exploitation allows attackers to cause an app ...

oval:org.secpod.oval:def:46730
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the HTTP2 dissector issue. Successful exploitation allows attackers to cause an application c ...

oval:org.secpod.oval:def:47271
The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the bluetooth AVDTP dissector issue. Successful exploitation allows attackers to cause an app ...

oval:org.secpod.oval:def:47272
The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the radiotap dissector issue. Successful exploitation allows attackers to cause an applicatio ...

oval:org.secpod.oval:def:47273
The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the bluetooth attribute protocol dissector issue. Successful exploitation allows attackers to ...

*CPE
cpe:/a:wireshark:wireshark:2.2::x86

© SecPod Technologies