Download
| Alert*
oval:org.secpod.oval:def:24528
The host is installed with Wireshark 1.12.x before 1.12.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reject a zero length. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:24526 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which improperly refers to previously processed bytes. Successful exploitation allows remote attackers to cause a denial of serv ... oval:org.secpod.oval:def:24527 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to multiple memory leak vulnerabilities. The flaws are present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (mem ... oval:org.secpod.oval:def:24529 The host is installed with Wireshark 1.12.x before 1.12.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly track the current offset. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:24531 The host is installed with Wireshark 1.12.x before 1.12.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly determine the defragmentation state in a case of an insufficient snapshot length. Successful exploitation allows remote attackers t ... oval:org.secpod.oval:def:24532 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which interprets a zero value as a length rather than an error condition. Successful exploitation allows remote attackers to cau ... oval:org.secpod.oval:def:25424 The host is installed with Wireshark 1.12.x before 1.12.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly validate digit characters. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:25425 The host is installed with Wireshark 1.12.x before 1.12.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether enough memory is available for storing IP address strings. Successful exploitation allows remote attackers to cau ... oval:org.secpod.oval:def:24530 The host is installed with Wireshark 1.12.x before 1.12.5 and is prone to denial of service vulnerability. A flaw is present in the application, which uses a recursive algorithm. Successful exploitation allows remote attackers to cause a denial of service (CPU consumption). oval:org.secpod.oval:def:34218 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the GSM A-bis OML dissector, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote atta ... oval:org.secpod.oval:def:34221 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to handle a crafted packet that triggers an empty set. Successful exploitation could allow remote attackers to ... oval:org.secpod.oval:def:34224 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to properly handle a packet that specifies deeply nested data. Successful exploitation could allow remote atta ... oval:org.secpod.oval:def:36102 The host is installed with Wireshark 1.12.x before 1.12.12 and is prone to a denial of service vulnerability. A flaw is present in the WBXML dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to consume excessive CPU resources. oval:org.secpod.oval:def:36100 The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the NetScreen file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash. oval:org.secpod.oval:def:36098 The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Toshiba file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash. oval:org.secpod.oval:def:36097 The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the USB dissectors, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause W ... oval:org.secpod.oval:def:36096 The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to caus ... oval:org.secpod.oval:def:36094 The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:36093 The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the SPOOLS dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:36099 The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the CoSine file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash. oval:org.secpod.oval:def:33149 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the recursion depth. Successful exploitation could allow remote attackers to cause a denial of service (memor ... oval:org.secpod.oval:def:33148 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote attackers to cau ... oval:org.secpod.oval:def:31562 The host is installed with Wireshark 1.12.x before 1.12.8 and is prone to denial of service vulnerability. A flaw is present in the application, which uses too many levels of pointer indirection. Successful exploitation allows remote attackers to cause a denial of service (incorrect free and applica ... oval:org.secpod.oval:def:33147 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the case of an unrecognized TLV type. Successful exploitation could allow remote attackers to cause a denial ... oval:org.secpod.oval:def:33140 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (infinite ... oval:org.secpod.oval:def:33138 The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the Wireshark Application class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use o ... oval:org.secpod.oval:def:40866 The host is installed Wireshark 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check the length of the payload. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and ... oval:org.secpod.oval:def:40867 The host is installed Wireshark 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a lack of \0 termination. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and ... oval:org.secpod.oval:def:26244 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses. Successful exploitation allows remote attackers to cause a denial o ... oval:org.secpod.oval:def:26243 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not check whether the expected amount of data is available. Successful exploitation allows remote attackers to cause a denial of service (applic ... oval:org.secpod.oval:def:26240 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which uses incorrect integer data types. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:26242 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate a certain offset value. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:26241 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles large tag values. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:26237 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size. Successful exploitation al ... oval:org.secpod.oval:def:26236 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly terminate a data structure after a failure to locate a number within a string. Successful exploitation allows remote attackers to c ... oval:org.secpod.oval:def:26239 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly relies on length fields contained in packet data. Successful exploitation allows remote attackers to cause a denial of service (applicatio ... oval:org.secpod.oval:def:26238 The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles table searches for empty strings. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:24176 Wireshark 1.12.x is installed oval:org.secpod.oval:def:36705 The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (OpenFlow dis ... oval:org.secpod.oval:def:36704 The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (stack-base ... oval:org.secpod.oval:def:36703 The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the LDSS dissector, which fails to handle a crafted packet and conversations. Successful exploitation allows remote attackers to cause a denial of ... oval:org.secpod.oval:def:36702 The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet which uses an incorrect integer data type. Successful exploitation allows remote attacker ... oval:org.secpod.oval:def:36700 The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WSP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite l ... oval:org.secpod.oval:def:36699 The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the PacketBB dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (divid ... oval:org.secpod.oval:def:36698 The host is installed with Wireshark 1.12.x before 1.12.13 and is prone to a denial of service vulnerability. A flaw is present in the NDS dissector, which fails to properly maintain a ptvc data structure. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer der ... oval:org.secpod.oval:def:36701 The host is installed with Wireshark 1.12.x before 1.12.13 and is prone to a denial of service vulnerability. A flaw is present in the MMSE dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:34145 The host is installed with Wireshark 1.12.x before 1.12.11 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the NCP dissector, which fails to handle a long string in a packet. Successful exploitation could allow remote attackers to cause a denial of service (applicat ... oval:org.secpod.oval:def:34142 The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the GSM CBCH dissector, which uses the wrong variable to index an array. Successful exploitation allows remote attackers to cause a denial of servi ... oval:org.secpod.oval:def:34140 The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which misparses timestamp fields. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds r ... oval:org.secpod.oval:def:34141 The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IAX2 dissector, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (infini ... oval:org.secpod.oval:def:34138 The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c, which fails to properly restrict elem ... oval:org.secpod.oval:def:34139 The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which fails to verify BER identifiers. Successful exploitation allows remote attackers to cause a denial of service (out-of-bou ... oval:org.secpod.oval:def:34135 The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the epan/proto.c, which fails to properly limit the protocol-tree depth. Successful exploitation allows remote attackers to cause a denial of servi ... oval:org.secpod.oval:def:32540 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationships between record lengths and record header lengths. Successful exploitation could allow attac ... oval:org.secpod.oval:def:32542 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reject unknown TLV types. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds re ... oval:org.secpod.oval:def:32541 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the Total Profile Number field. Successful exploitation could allow attackers to cause a denial of service (o ... oval:org.secpod.oval:def:32543 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of items. Successful exploitation could allow attackers to cause a denial of service (invalid read ... oval:org.secpod.oval:def:32547 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate certain signature and Modulation and Coding Scheme (MCS) data. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:32544 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure the presence of a '\0' character at the end of a date string. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:32546 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly maintain request-key data. Successful exploitation could allow attackers to cause a denial of service (use-af ... oval:org.secpod.oval:def:32545 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly uses the tvb_bcd_dig_to_wmem_packet_str function. Successful exploitation could allow attackers to cause a denial of ... oval:org.secpod.oval:def:32551 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the frame pointer. Successful exploitation could allow attackers to cause a denial of service (NULL pointer d ... oval:org.secpod.oval:def:32550 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationship between the total length and the capture length. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:32552 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which cause a denial of service. Successful exploitation could allow attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:32548 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the IPv6 prefix length. Successful exploitation could allow attackers to cause a denial of service (stack-bas ... oval:org.secpod.oval:def:32549 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not verify the WPA broadcast key length. Successful exploitation could allow attackers to cause a denial of service (out-o ... oval:org.secpod.oval:def:32555 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which enables "Match MSG/RES packets for async NLM" option. Successful exploitation could allow attackers to cause a denial of servic ... oval:org.secpod.oval:def:32554 The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles the EDNS0 Client Subnet option. Successful exploitation could allow attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:32557 The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure that a conversation exists. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:32556 The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not prevent use of a negative media count. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:32553 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly checks an sscanf return value. Successful exploitation could allow attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:32561 The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of PDUs. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:32560 The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly reserve memory for channel ID mappings. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds ... oval:org.secpod.oval:def:32559 The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not initialize a certain IPv4 data structure. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:32558 The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not check for empty arguments. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:32562 The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate conversation data. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer ... |