[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:45724
Wireshark 2.6.x is installed

oval:org.secpod.oval:def:45725
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the LWAPP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45726
The host is installed with Wireshark 2.6.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 802.11 protocol dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45727
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the GSM A DTAP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45728
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RRC dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45729
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Q.931 dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45730
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the LTP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45731
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the DNS dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45732
The host is installed with Wireshark 2.6.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RTCP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:45733
The host is installed with Wireshark 2.6.0, 2.4.0 to 2.4.6 or 2.2.0 to 2.2.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 1905.1a dissector issue. Successful exploitation allows attackers to cause an application crash ...

oval:org.secpod.oval:def:46733
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the MMSE dissector issue. Successful exploitation allows attackers to cause an application cr ...

oval:org.secpod.oval:def:46734
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in dissectors that support zlib decompression. Successful exploitation allows atta ...

oval:org.secpod.oval:def:46735
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the DICOM dissector issue. Successful exploitation allows attackers to cause an application c ...

oval:org.secpod.oval:def:46736
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the BGP protocol dissector issue. Successful exploitation allows attackers to cause an applic ...

oval:org.secpod.oval:def:46737
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ASN.1 BER dissector issue. Successful exploitation allows attackers to cause an applicati ...

oval:org.secpod.oval:def:46738
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ISMP dissector issue. Successful exploitation allows attackers to cause an application cr ...

oval:org.secpod.oval:def:46739
The host is installed with Wireshark 2.6.0 to 2.6.1 or 2.4.0 to 2.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the CoAP protocol dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:46740
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Bazaar protocol dissector issue. Successful exploitation allows attackers to cause an app ...

oval:org.secpod.oval:def:46741
The host is installed with Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7 or 2.2.0 to 2.2.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the HTTP2 dissector issue. Successful exploitation allows attackers to cause an application c ...

oval:org.secpod.oval:def:46742
The host is installed with Wireshark 2.6.0 to 2.6.1 or 2.4.0 to 2.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 802.11 protocol dissector issue. Successful exploitation allows attackers to cause an application cra ...

oval:org.secpod.oval:def:46743
The host is installed with Wireshark through 2.6.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the create_app_running_mutex function issue. Successful exploitation allows attackers to arbitrarily modify access control.

oval:org.secpod.oval:def:47274
The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Bluetooth AVDTP dissector issue. Successful exploitation allows attackers to cause an app ...

oval:org.secpod.oval:def:47275
The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Radiotap dissector issue. Successful exploitation allows attackers to cause an applicatio ...

oval:org.secpod.oval:def:47276
The host is installed with Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8 or 2.2.0 to 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the Bluetooth Attribute Protocol dissector issue. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:48000
The host is installed with Wireshark 2.6.0 to 2.6.3 or 2.4.0 to 2.4.9 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the OpcUa dissector issue. Successful exploitation allows attackers to trigger a stack overflow with carefully s ...

oval:org.secpod.oval:def:48001
The host is installed with Wireshark 2.6.0 to 2.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the CoAP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:48002
The host is installed with Wireshark 2.6.0 to 2.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the steam IHS discovery dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:50188
The host is installed with Wireshark 2.6.0 to 2.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-enip.c file. Successful exploitation allows attackers to crash the 6LoWPAN dissector.

oval:org.secpod.oval:def:50189
The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the invalid sequence number of zero in epan/dissectors/packet-p_mul.c. Successful exploitation allows attacke ...

oval:org.secpod.oval:def:50190
The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/charsets.c file. Successful exploitation allows attackers to crash the RTSE dissector.

oval:org.secpod.oval:def:50191
The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the case of a missing decryption data block in epan/dissectors/packet-isakmp.c file. Successful exploitation ...

oval:org.secpod.oval:def:50192
The host is installed with Wireshark 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-enip.c file. Successful exploitation allows attackers to crash the ENIP dissector.

oval:org.secpod.oval:def:54379
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-gssapi.c file. Successful exploitation allows attackers to crash th ...

oval:org.secpod.oval:def:54381
The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the invalid sequence number of zero in wiretap/netscaler.c. Successful exploitation allows attackers t ...

oval:org.secpod.oval:def:54382
The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-dof.c file. Successful exploitation allows attackers to crash the DOF ...

oval:org.secpod.oval:def:54385
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-srvloc.c file. Successful exploitation allows attackers to crash ...

oval:org.secpod.oval:def:54388
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-ldss.c file. Successful exploitation allows attackers to crash t ...

oval:org.secpod.oval:def:54389
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in DCERPC SPOOLSS dissector file. Successful exploitation allows attackers to crash the ENI ...

oval:org.secpod.oval:def:55044
The host is installed with Wireshark 2.4.0 to 2.4.14, 2.6.0 to 2.6.8 or 3.0.0 to 3.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/packet.c file. Successful exploitation allows attackers to crash the dissect ...

oval:org.secpod.oval:def:58640
The host is installed with Wireshark 2.6.0 to 2.6.10 or 3.0.0 to 3.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in plugins/epan/gryphon/packet-gryphon.c file. Successful exploitation allows attackers to crash the ...

oval:org.secpod.oval:def:62430
The host is installed with Wireshark 2.6.0 before 2.6.16, 3.0.0 before 3.0.10 or 3.2.0 before 3.2.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark c ...

oval:org.secpod.oval:def:62431
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark crash.

oval:org.secpod.oval:def:65728
The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ...

oval:org.secpod.oval:def:65729
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ...

oval:org.secpod.oval:def:65730
The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ...

oval:org.secpod.oval:def:65731
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ...

oval:org.secpod.oval:def:53075
The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RPCAP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:53077
The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the TCAP dissector issue. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:53076
The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ASN.1 BER dissector issue. Successful exploitation could cause buffer overflow associated with excessive ...

oval:org.secpod.oval:def:49248
The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-pvfs2.c file. Successful exploitation allows attackers to cause a null pointer der ...

oval:org.secpod.oval:def:49249
The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/tvbuff_composite.c file. Successful exploitation allows attackers to trigger a heap-based buffer ove ...

oval:org.secpod.oval:def:49246
The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-mmse.c file. Successful exploitation allows attackers to crash the MMSE dissector.

oval:org.secpod.oval:def:49247
The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-lbmpdm.c file. Successful exploitation allows attackers to write arbitrary data to ...

oval:org.secpod.oval:def:49251
The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the wiretap/vwr.c file. Successful exploitation allows attackers to crash the IxVeriWave file parser.

oval:org.secpod.oval:def:49252
The host is installed with Wireshark 2.6.0 to 2.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-zbee-zcl-lighting.c file. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:49250
The host is installed with Wireshark 2.6.0 to 2.6.4 or 2.4.0 to 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the epan/dissectors/packet-dcom.c file. Successful exploitation allows attackers to crash the DCOM dissector.

oval:org.secpod.oval:def:48003
The host is installed with Wireshark 2.6.0 to 2.6.3 or 2.4.0 to 2.4.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the MS-WSP dissector issue. Successful exploitation allows attackers to cause an application crash.

*CPE
cpe:/a:wireshark:wireshark:2.6

© SecPod Technologies