Download
| Alert*
oval:org.secpod.oval:def:45724
Wireshark 2.6.x is installed oval:org.secpod.oval:def:45725 The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the LWAPP dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45726 The host is installed with Wireshark 2.6.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 802.11 protocol dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45727 The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the GSM A DTAP dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45728 The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RRC dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45729 The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Q.931 dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45730 The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the LTP dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45731 The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the DNS dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45732 The host is installed with Wireshark 2.6.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RTCP dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:45733 The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 1905.1a dissector issue. Successful exploitation allows attackers to cause an application crash ... oval:org.secpod.oval:def:46733 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the MMSE dissector issue. Successful exploitation allows attackers to cause an application cr ... oval:org.secpod.oval:def:46734 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in dissectors that support zlib decompression. Successful exploitation allows atta ... oval:org.secpod.oval:def:46735 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the DICOM dissector issue. Successful exploitation allows attackers to cause an application c ... oval:org.secpod.oval:def:46736 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the BGP protocol dissector issue. Successful exploitation allows attackers to cause an applic ... oval:org.secpod.oval:def:46737 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ASN.1 BER dissector issue. Successful exploitation allows attackers to cause an applicati ... oval:org.secpod.oval:def:46738 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ISMP dissector issue. Successful exploitation allows attackers to cause an application cr ... oval:org.secpod.oval:def:46739 The host is installed with Wireshark 2.6.0 to 2.6.1 or 2.4.0 to 2.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the CoAP protocol dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:46740 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Bazaar protocol dissector issue. Successful exploitation allows attackers to cause an app ... oval:org.secpod.oval:def:46741 The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the HTTP2 dissector issue. Successful exploitation allows attackers to cause an application c ... oval:org.secpod.oval:def:46742 The host is installed with Wireshark 2.6.0 to 2.6.1 or 2.4.0 to 2.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 802.11 protocol dissector issue. Successful exploitation allows attackers to cause an application cra ... oval:org.secpod.oval:def:46743 The host is installed with Wireshark through 2.6.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the create_app_running_mutex function issue. Successful exploitation allows attackers to arbitrarily modify access control. oval:org.secpod.oval:def:47274 The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Bluetooth AVDTP dissector issue. Successful exploitation allows attackers to cause an app ... oval:org.secpod.oval:def:47275 The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Radiotap dissector issue. Successful exploitation allows attackers to cause an applicatio ... oval:org.secpod.oval:def:47276 The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Bluetooth Attribute Protocol dissector issue. Successful exploitation allows attackers to ... oval:org.secpod.oval:def:48000 The host is installed with Wireshark 2.6.0 to 2.6.3 or 2.4.0 to 2.4.9 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the OpcUa dissector issue. Successful exploitation allows attackers to trigger a stack overflow with carefully s ... oval:org.secpod.oval:def:48001 The host is installed with Wireshark 2.6.0 to 2.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the CoAP dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:48002 The host is installed with Wireshark 2.6.0 to 2.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the steam IHS discovery dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:50188 The host is installed with Wireshark 2.6.0 to 2.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-enip.c file. Successful exploitation allows attackers to crash the 6LoWPAN dissector. oval:org.secpod.oval:def:50189 The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the invalid sequence number of zero in epan/dissectors/packet-p_mul.c. Successful exploitation allows attacke ... oval:org.secpod.oval:def:50190 The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/charsets.c file. Successful exploitation allows attackers to crash the RTSE dissector. oval:org.secpod.oval:def:50191 The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the case of a missing decryption data block in epan/dissectors/packet-isakmp.c file. Successful exploitation ... oval:org.secpod.oval:def:50192 The host is installed with Wireshark 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-enip.c file. Successful exploitation allows attackers to crash the ENIP dissector. oval:org.secpod.oval:def:54379 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-gssapi.c file. Successful exploitation allows attackers to crash th ... oval:org.secpod.oval:def:54381 The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the invalid sequence number of zero in wiretap/netscaler.c. Successful exploitation allows attackers t ... oval:org.secpod.oval:def:54382 The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-dof.c file. Successful exploitation allows attackers to crash the DOF ... oval:org.secpod.oval:def:54385 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-srvloc.c file. Successful exploitation allows attackers to crash ... oval:org.secpod.oval:def:54388 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-ldss.c file. Successful exploitation allows attackers to crash t ... oval:org.secpod.oval:def:54389 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in DCERPC SPOOLSS dissector file. Successful exploitation allows attackers to crash the ENI ... oval:org.secpod.oval:def:55044 The host is installed with Wireshark 2.4.0 to 2.4.14, 2.6.0 to 2.6.8 or 3.0.0 to 3.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/packet.c file. Successful exploitation allows attackers to crash the dissect ... oval:org.secpod.oval:def:58640 The host is installed with Wireshark 2.6.0 to 2.6.10 or 3.0.0 to 3.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in plugins/epan/gryphon/packet-gryphon.c file. Successful exploitation allows attackers to crash the ... oval:org.secpod.oval:def:62430 The host is installed with Wireshark 2.6.0 before 2.6.16, 3.0.0 before 3.0.10 or 3.2.0 before 3.2.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark c ... oval:org.secpod.oval:def:62431 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark crash. oval:org.secpod.oval:def:65728 The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ... oval:org.secpod.oval:def:65729 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ... oval:org.secpod.oval:def:65730 The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ... oval:org.secpod.oval:def:65731 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ... oval:org.secpod.oval:def:53075 The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RPCAP dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:53077 The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the TCAP dissector issue. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:53076 The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ASN.1 BER dissector issue. Successful exploitation could cause buffer overflow associated with excessive ... oval:org.secpod.oval:def:49248 The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-pvfs2.c file. Successful exploitation allows attackers to cause a null pointer der ... oval:org.secpod.oval:def:49249 The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/tvbuff_composite.c file. Successful exploitation allows attackers to trigger a heap-based buffer ove ... oval:org.secpod.oval:def:49246 The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-mmse.c file. Successful exploitation allows attackers to crash the MMSE dissector. oval:org.secpod.oval:def:49247 The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-lbmpdm.c file. Successful exploitation allows attackers to write arbitrary data to ... oval:org.secpod.oval:def:49251 The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the wiretap/vwr.c file. Successful exploitation allows attackers to crash the IxVeriWave file parser. oval:org.secpod.oval:def:49252 The host is installed with Wireshark 2.6.0 to 2.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-zbee-zcl-lighting.c file. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:49250 The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-dcom.c file. Successful exploitation allows attackers to crash the DCOM dissector. oval:org.secpod.oval:def:48003 The host is installed with Wireshark 2.6.0 to 2.6.3 or 2.4.0 to 2.4.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the MS-WSP dissector issue. Successful exploitation allows attackers to cause an application crash. |