Download
| Alert*
oval:org.secpod.oval:def:54380
Wireshark 3.0.x is installed oval:org.secpod.oval:def:54379 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-gssapi.c file. Successful exploitation allows attackers to crash th ... oval:org.secpod.oval:def:54381 The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the invalid sequence number of zero in wiretap/netscaler.c. Successful exploitation allows attackers t ... oval:org.secpod.oval:def:54382 The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-dof.c file. Successful exploitation allows attackers to crash the DOF ... oval:org.secpod.oval:def:54383 The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-ieee80211.c file. Successful exploitation allows attackers to crash the IEEE 802.11 dissector. oval:org.secpod.oval:def:54384 The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-gsm_gsup.c file. Successful exploitation allows attackers to crash the GSUP dissector. oval:org.secpod.oval:def:54385 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-srvloc.c file. Successful exploitation allows attackers to crash ... oval:org.secpod.oval:def:54386 The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/file-rbm.r file. Successful exploitation allows attackers to crash the ENIP dissector. oval:org.secpod.oval:def:54387 The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-tsdns.c file. Successful exploitation allows attackers to crash the TSDNS dissector. oval:org.secpod.oval:def:54388 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-ldss.c file. Successful exploitation allows attackers to crash t ... oval:org.secpod.oval:def:54389 The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in DCERPC SPOOLSS dissector file. Successful exploitation allows attackers to crash the ENI ... oval:org.secpod.oval:def:55044 The host is installed with Wireshark 2.4.0 to 2.4.14, 2.6.0 to 2.6.8 or 3.0.0 to 3.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/packet.c file. Successful exploitation allows attackers to crash the dissect ... oval:org.secpod.oval:def:58640 The host is installed with Wireshark 2.6.0 to 2.6.10 or 3.0.0 to 3.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in plugins/epan/gryphon/packet-gryphon.c file. Successful exploitation allows attackers to crash the ... oval:org.secpod.oval:def:60890 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-btatt.c file. Successful exploitation allows attackers to cras ... oval:org.secpod.oval:def:60892 The host is installed with Wireshark 3.0.x before 3.0.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-btatt.c file. Successful exploitation allows attackers to crash the bluetooth attribute dis ... oval:org.secpod.oval:def:62430 The host is installed with Wireshark 2.6.0 before 2.6.16, 3.0.0 before 3.0.10 or 3.2.0 before 3.2.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark c ... oval:org.secpod.oval:def:62431 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark crash. oval:org.secpod.oval:def:65728 The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ... oval:org.secpod.oval:def:65729 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ... oval:org.secpod.oval:def:65730 The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ... oval:org.secpod.oval:def:65731 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ... oval:org.secpod.oval:def:65732 The host is installed with Wireshark 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the BLIP dissector ... oval:org.secpod.oval:def:65733 The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ... |