[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:46073
The host is installed with Wireshark 2.0.x or 2.2.x with USPBcap component 1.1.0.0 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the USPBcap component issue. Successful exploitation allows attackers to gain elevated p ...

oval:org.secpod.oval:def:32495
Wireshark (64 bit) 2.0.x series is installed

oval:org.secpod.oval:def:42402
The host is installed with Wireshark 2.0.x before 2.0.16, 2.2.x before 2.2.10 or 2.4.x before 2.4.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attack ...

oval:org.secpod.oval:def:34211
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the GSM A-bis OML dissector, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:34212
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the Ixia IxVeriWave file parser, which incorrectly increases a certain octet count. Successful exploitation could allow remote attackers to cause a denial of service (heap- ...

oval:org.secpod.oval:def:34213
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to properly handle the grouping subfield. Successful exploitation could allow remote attackers to cause a denial of service (buffer o ...

oval:org.secpod.oval:def:34214
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to handle a crafted packet that triggers an empty set. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:34215
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the SPICE dissector, which mishandles capability data. Successful exploitation could allow remote attackers to cause a denial of service (large loop).

oval:org.secpod.oval:def:34216
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the NFS dissector, which fails to properly handle a crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:34217
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to properly handle a packet that specifies deeply nested data. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:36091
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Ethernet dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36090
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the NetScreen file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36087
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the USB dissectors, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause W ...

oval:org.secpod.oval:def:36086
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to caus ...

oval:org.secpod.oval:def:36085
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36084
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:36083
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the SPOOLS dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:36089
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the CoSine file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36088
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Toshiba file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:33137
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the recursion depth. Successful exploitation could allow remote attackers to cause a denial of service (memor ...

oval:org.secpod.oval:def:33134
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to consider that a line may lack the "OBJECT PROTOCOL" substring. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:33133
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate length values. Successful exploitation could allow remote attackers to cause a denial of service (stack-based buffer overflow and a ...

oval:org.secpod.oval:def:33136
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote attackers to cau ...

oval:org.secpod.oval:def:33135
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the case of an unrecognized TLV type. Successful exploitation could allow remote attackers to cause a denial ...

oval:org.secpod.oval:def:33130
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the amount of header data. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption or ap ...

oval:org.secpod.oval:def:33132
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to ensure that a '\0' character is present at the end of certain strings. Successful exploitation could allow remote attackers to cause a denia ...

oval:org.secpod.oval:def:33131
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate the data type. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and applicatio ...

oval:org.secpod.oval:def:33127
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle BER dissector which verifies certain length is nonzero. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:33126
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the WiresharkApplication class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use of ...

oval:org.secpod.oval:def:33129
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which mishandles the algorithm ID. Successful exploitation could allow remote attackers to cause a denial of service (application crash) via a crafted pack ...

oval:org.secpod.oval:def:33128
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (infinit ...

oval:org.secpod.oval:def:39861
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39862
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40675
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:39863
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39864
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40673
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv4 address. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39865
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40678
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:40676
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the Vendor Class Identifier. Successful exploitation could allow remote attackers to read past the end ...

oval:org.secpod.oval:def:40677
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check for a negative length. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40681
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:40682
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly detect self-referencing pointers. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40683
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate an interval value. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40684
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a NULL pointer. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41385
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41386
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41384
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41389
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the relationships between indexes and lengths. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:38872
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the DHCPv6 dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the appl ...

oval:org.secpod.oval:def:38873
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the ASTERIX dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the app ...

oval:org.secpod.oval:def:41387
The host is installed with Wireshark 2.0.x through 2.0.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41388
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle length validation. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38110
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the AllJoyn dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:38111
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an use-after-free vulnerability. A flaw is present in the DCERPC dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service wit ...

oval:org.secpod.oval:def:38109
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an unspecified vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service by f ...

oval:org.secpod.oval:def:41830
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the servic ...

oval:org.secpod.oval:def:38108
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:41835
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39940
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39937
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39938
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39939
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:36976
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the IPMI trace dissector, which does not properly consider whether a string is constant. Successful exploitation allows remote attackers to cause a denial of service (use-a ...

oval:org.secpod.oval:def:36975
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36974
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which does not ensure that memory is allocated for certain data structures. Successful exploitation allows remote attackers to cause a denial of serv ...

oval:org.secpod.oval:def:36973
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which does not restrict the number of channels. Successful exploitation allows remote attackers to cause a denial of service (buffer over-re ...

oval:org.secpod.oval:def:36972
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the H.225 dissector, which calls snprintf with one of its input buffers as the output buffer. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:36971
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the QNX6 QNET dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and appl ...

oval:org.secpod.oval:def:36697
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WBXML dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36696
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the tvb_get_guintvar function, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:36692
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet which uses an incorrect integer data type. Successful exploitation allows remote attacker ...

oval:org.secpod.oval:def:36695
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (OpenFlow dis ...

oval:org.secpod.oval:def:36694
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (stack-base ...

oval:org.secpod.oval:def:36693
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the LDSS dissector, which fails to handle a crafted packet and conversations. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:36690
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WSP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite l ...

oval:org.secpod.oval:def:36689
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the PacketBB dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (divid ...

oval:org.secpod.oval:def:36687
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the CORBA IDL dissector, which fails to properly interact with visual C++ compiler options. Successful exploitation which allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:34132
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to ensure that data is available before array allocation. Successful exploitation allows remote attackers to cause a denial of service (ap ...

oval:org.secpod.oval:def:34133
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to handle a crafted packet that triggers an unexpected array size. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:34131
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the GSM CBCH dissector, which uses the wrong variable to index an array. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:34126
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the TShark, which relies on incorrect special-case handling of truncated Tvb data structures. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:34130
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IAX2 dissector, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (infini ...

oval:org.secpod.oval:def:34129
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which misparses timestamp fields. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds r ...

oval:org.secpod.oval:def:34127
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c, which fails to properly restrict elem ...

oval:org.secpod.oval:def:34128
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which fails to verify BER identifiers. Successful exploitation allows remote attackers to cause a denial of service (out-of-bou ...

oval:org.secpod.oval:def:34125
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the NCP dissector, which fails to properly initialize memory for search patterns. Successful exploitation allows remote attackers to cause a denial of service (application ...

oval:org.secpod.oval:def:34124
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the epan/proto.c, which fails to properly limit the protocol-tree depth. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:32496
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the column size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption or application cras ...

oval:org.secpod.oval:def:32498
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of columns. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ...

oval:org.secpod.oval:def:32497
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not initialize a packet-header data structure. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32499
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly attempts to access a packet scope. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and appli ...

oval:org.secpod.oval:def:32503
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (invalid write operation and applicat ...

oval:org.secpod.oval:def:32500
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the list count in an SZL response. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error ...

oval:org.secpod.oval:def:32502
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reserve memory for a trailer. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ap ...

oval:org.secpod.oval:def:32501
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the bit rate. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error and application cras ...

oval:org.secpod.oval:def:32504
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles the packet type. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32506
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the Total Profile Number field. Successful exploitation could allow attackers to cause a denial of service (o ...

oval:org.secpod.oval:def:32505
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationships between record lengths and record header lengths. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:32508
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of items. Successful exploitation could allow attackers to cause a denial of service (invalid read ...

oval:org.secpod.oval:def:32507
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reject unknown TLV types. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds re ...

oval:org.secpod.oval:def:32511
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly maintain request-key data. Successful exploitation could allow attackers to cause a denial of service (use-af ...

oval:org.secpod.oval:def:32510
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly uses the tvb_bcd_dig_to_wmem_packet_str function. Successful exploitation could allow attackers to cause a denial of ...

oval:org.secpod.oval:def:32512
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate certain signature and Modulation and Coding Scheme (MCS) data. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:32509
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure the presence of a '\0' character at the end of a date string. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:32515
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationship between the total length and the capture length. Successful exploitation could allow attacke ...

oval:org.secpod.oval:def:32514
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not verify the WPA broadcast key length. Successful exploitation could allow attackers to cause a denial of service (out-o ...

oval:org.secpod.oval:def:32517
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which cause a denial of service. Successful exploitation could allow attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32516
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the frame pointer. Successful exploitation could allow attackers to cause a denial of service (NULL pointer d ...

oval:org.secpod.oval:def:32513
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the IPv6 prefix length. Successful exploitation could allow attackers to cause a denial of service (stack-bas ...

oval:org.secpod.oval:def:32520
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which enables "Match MSG/RES packets for async NLM" option. Successful exploitation could allow attackers to cause a denial of servic ...

oval:org.secpod.oval:def:32518
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly checks an sscanf return value. Successful exploitation could allow attackers to cause a denial of service (applicati ...

oval:org.secpod.oval:def:32527
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate conversation data. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer ...

*CPE
cpe:/a:wireshark:wireshark:2.0::x64

© SecPod Technologies