[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:42405
The host is installed with Wireshark 2.0.x before 2.0.16, 2.2.x before 2.2.10 or 2.4.x before 2.4.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attack ...

oval:org.secpod.oval:def:34218
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the GSM A-bis OML dissector, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:34219
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the Ixia IxVeriWave file parser, which incorrectly increases a certain octet count. Successful exploitation could allow remote attackers to cause a denial of service (heap- ...

oval:org.secpod.oval:def:34220
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to properly handle the grouping subfield. Successful exploitation could allow remote attackers to cause a denial of service (buffer o ...

oval:org.secpod.oval:def:34221
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to handle a crafted packet that triggers an empty set. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:34222
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the SPICE dissector, which mishandles capability data. Successful exploitation could allow remote attackers to cause a denial of service (large loop).

oval:org.secpod.oval:def:34223
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the NFS dissector, which fails to properly handle a crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:34224
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to properly handle a packet that specifies deeply nested data. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:36098
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Toshiba file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36097
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the USB dissectors, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause W ...

oval:org.secpod.oval:def:36096
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to caus ...

oval:org.secpod.oval:def:36095
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36094
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:36093
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the SPOOLS dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:36099
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the CoSine file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36101
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Ethernet dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36100
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the NetScreen file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:38845
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the DHCPv6 dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the appl ...

oval:org.secpod.oval:def:33149
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the recursion depth. Successful exploitation could allow remote attackers to cause a denial of service (memor ...

oval:org.secpod.oval:def:33148
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote attackers to cau ...

oval:org.secpod.oval:def:33145
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate length values. Successful exploitation could allow remote attackers to cause a denial of service (stack-based buffer overflow and a ...

oval:org.secpod.oval:def:33144
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to ensure that a '\0' character is present at the end of certain strings. Successful exploitation could allow remote attackers to cause a denia ...

oval:org.secpod.oval:def:33147
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the case of an unrecognized TLV type. Successful exploitation could allow remote attackers to cause a denial ...

oval:org.secpod.oval:def:33146
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to consider that a line may lack the "OBJECT PROTOCOL" substring. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:33141
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:33140
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (infinite ...

oval:org.secpod.oval:def:33143
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate the data type. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and applicatio ...

oval:org.secpod.oval:def:33142
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the amount of header data. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption or ap ...

oval:org.secpod.oval:def:33138
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the Wireshark Application class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use o ...

oval:org.secpod.oval:def:33139
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle BER dissector which verifies certain length is nonzero. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:40704
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:40705
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the Vendor Class Identifier. Successful exploitation could allow remote attackers to read past the end ...

oval:org.secpod.oval:def:40702
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv4 address. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39870
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40706
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check for a negative length. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39871
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40707
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:39869
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:41400
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41401
The host is installed with Wireshark 2.0.x through 2.0.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40711
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly detect self-referencing pointers. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40712
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate an interval value. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39867
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:41402
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle length validation. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39868
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40710
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:41403
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the relationships between indexes and lengths. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40713
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a NULL pointer. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38101
The host is installed with Wireshark 2.0.x before 2.0.7 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:38102
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an unspecified vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service by f ...

oval:org.secpod.oval:def:38103
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the AllJoyn dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:41398
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:38104
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an use-after-free vulnerability. A flaw is present in the DCERPC dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service wit ...

oval:org.secpod.oval:def:41399
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41836
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the servic ...

oval:org.secpod.oval:def:41840
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38846
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the ASTERIX dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the app ...

oval:org.secpod.oval:def:32531
Wireshark 2.0.x is installed

oval:org.secpod.oval:def:36986
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the IPMI trace dissector, which does not properly consider whether a string is constant. Successful exploitation allows remote attackers to cause a denial of service (use-a ...

oval:org.secpod.oval:def:36985
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36984
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which does not ensure that memory is allocated for certain data structures. Successful exploitation allows remote attackers to cause a denial of serv ...

oval:org.secpod.oval:def:36983
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which does not restrict the number of channels. Successful exploitation allows remote attackers to cause a denial of service (buffer over-re ...

oval:org.secpod.oval:def:36982
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the H.225 dissector, which calls snprintf with one of its input buffers as the output buffer. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:36981
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the QNX6 QNET dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and appl ...

oval:org.secpod.oval:def:36707
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WBXML dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36706
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the tvb_get_guintvar function, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:36705
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (OpenFlow dis ...

oval:org.secpod.oval:def:36704
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (stack-base ...

oval:org.secpod.oval:def:36703
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the LDSS dissector, which fails to handle a crafted packet and conversations. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:36702
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet which uses an incorrect integer data type. Successful exploitation allows remote attacker ...

oval:org.secpod.oval:def:36700
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WSP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite l ...

oval:org.secpod.oval:def:36699
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the PacketBB dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (divid ...

oval:org.secpod.oval:def:34143
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to ensure that data is available before array allocation. Successful exploitation allows remote attackers to cause a denial of service (ap ...

oval:org.secpod.oval:def:34144
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to handle a crafted packet that triggers an unexpected array size. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:34142
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the GSM CBCH dissector, which uses the wrong variable to index an array. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:34140
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which misparses timestamp fields. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds r ...

oval:org.secpod.oval:def:34141
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IAX2 dissector, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (infini ...

oval:org.secpod.oval:def:34138
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c, which fails to properly restrict elem ...

oval:org.secpod.oval:def:34139
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which fails to verify BER identifiers. Successful exploitation allows remote attackers to cause a denial of service (out-of-bou ...

oval:org.secpod.oval:def:34137
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the TShark, which relies on incorrect special-case handling of truncated Tvb data structures. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:34136
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the NCP dissector, which fails to properly initialize memory for search patterns. Successful exploitation allows remote attackers to cause a denial of service (application ...

oval:org.secpod.oval:def:34135
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the epan/proto.c, which fails to properly limit the protocol-tree depth. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:32533
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of columns. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ...

oval:org.secpod.oval:def:32532
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not initialize a packet-header data structure. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32530
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the column size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption or application cras ...

oval:org.secpod.oval:def:32537
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reserve memory for a trailer. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ap ...

oval:org.secpod.oval:def:32536
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the bit rate. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error and application cras ...

oval:org.secpod.oval:def:32538
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (invalid write operation and applicat ...

oval:org.secpod.oval:def:32535
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the list count in an SZL response. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error ...

oval:org.secpod.oval:def:32534
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly attempts to access a packet scope. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and appli ...

oval:org.secpod.oval:def:32543
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of items. Successful exploitation could allow attackers to cause a denial of service (invalid read ...

oval:org.secpod.oval:def:32540
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationships between record lengths and record header lengths. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:32542
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reject unknown TLV types. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds re ...

oval:org.secpod.oval:def:32541
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the Total Profile Number field. Successful exploitation could allow attackers to cause a denial of service (o ...

oval:org.secpod.oval:def:32539
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles the packet type. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32547
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate certain signature and Modulation and Coding Scheme (MCS) data. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:32544
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure the presence of a '\0' character at the end of a date string. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:32546
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly maintain request-key data. Successful exploitation could allow attackers to cause a denial of service (use-af ...

oval:org.secpod.oval:def:32545
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly uses the tvb_bcd_dig_to_wmem_packet_str function. Successful exploitation could allow attackers to cause a denial of ...

oval:org.secpod.oval:def:32551
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the frame pointer. Successful exploitation could allow attackers to cause a denial of service (NULL pointer d ...

oval:org.secpod.oval:def:32550
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationship between the total length and the capture length. Successful exploitation could allow attacke ...

oval:org.secpod.oval:def:32552
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which cause a denial of service. Successful exploitation could allow attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32548
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the IPv6 prefix length. Successful exploitation could allow attackers to cause a denial of service (stack-bas ...

oval:org.secpod.oval:def:32549
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not verify the WPA broadcast key length. Successful exploitation could allow attackers to cause a denial of service (out-o ...

oval:org.secpod.oval:def:32555
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which enables "Match MSG/RES packets for async NLM" option. Successful exploitation could allow attackers to cause a denial of servic ...

oval:org.secpod.oval:def:32553
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly checks an sscanf return value. Successful exploitation could allow attackers to cause a denial of service (applicati ...

oval:org.secpod.oval:def:32562
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate conversation data. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer ...

*CPE
cpe:/a:wireshark:wireshark:2.0

© SecPod Technologies