[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:54380
Wireshark 3.0.x is installed

oval:org.secpod.oval:def:54379
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-gssapi.c file. Successful exploitation allows attackers to crash th ...

oval:org.secpod.oval:def:54381
The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the invalid sequence number of zero in wiretap/netscaler.c. Successful exploitation allows attackers t ...

oval:org.secpod.oval:def:54382
The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-dof.c file. Successful exploitation allows attackers to crash the DOF ...

oval:org.secpod.oval:def:54383
The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-ieee80211.c file. Successful exploitation allows attackers to crash the IEEE 802.11 dissector.

oval:org.secpod.oval:def:54384
The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-gsm_gsup.c file. Successful exploitation allows attackers to crash the GSUP dissector.

oval:org.secpod.oval:def:54385
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-srvloc.c file. Successful exploitation allows attackers to crash ...

oval:org.secpod.oval:def:54386
The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/file-rbm.r file. Successful exploitation allows attackers to crash the ENIP dissector.

oval:org.secpod.oval:def:54387
The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-tsdns.c file. Successful exploitation allows attackers to crash the TSDNS dissector.

oval:org.secpod.oval:def:54388
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in epan/dissectors/packet-ldss.c file. Successful exploitation allows attackers to crash t ...

oval:org.secpod.oval:def:54389
The host is installed with Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issues in DCERPC SPOOLSS dissector file. Successful exploitation allows attackers to crash the ENI ...

oval:org.secpod.oval:def:55044
The host is installed with Wireshark 2.4.0 to 2.4.14, 2.6.0 to 2.6.8 or 3.0.0 to 3.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/packet.c file. Successful exploitation allows attackers to crash the dissect ...

oval:org.secpod.oval:def:58640
The host is installed with Wireshark 2.6.0 to 2.6.10 or 3.0.0 to 3.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in plugins/epan/gryphon/packet-gryphon.c file. Successful exploitation allows attackers to crash the ...

oval:org.secpod.oval:def:60890
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-btatt.c file. Successful exploitation allows attackers to cras ...

oval:org.secpod.oval:def:60892
The host is installed with Wireshark 3.0.x before 3.0.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-btatt.c file. Successful exploitation allows attackers to crash the bluetooth attribute dis ...

oval:org.secpod.oval:def:62430
The host is installed with Wireshark 2.6.0 before 2.6.16, 3.0.0 before 3.0.10 or 3.2.0 before 3.2.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark c ...

oval:org.secpod.oval:def:62431
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to make Wireshark crash.

oval:org.secpod.oval:def:65728
The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ...

oval:org.secpod.oval:def:65729
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ...

oval:org.secpod.oval:def:65730
The host is installed with Wireshark 2.6.0 to 2.6.19, 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash t ...

oval:org.secpod.oval:def:65731
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ...

oval:org.secpod.oval:def:65732
The host is installed with Wireshark 3.0.0 to 3.0.13 or 3.2.0 to 3.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the BLIP dissector ...

oval:org.secpod.oval:def:65733
The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in malformed packet trace file. Successful exploitation allows attackers to crash the ...

*CPE
cpe:/a:wireshark:wireshark:3.0

© SecPod Technologies