[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the DVB-S2-BB dissector issue. Successful exploitation allows Wireshark to consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malform ...

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the DVB-S2-BB dissector issue. Successful exploitation allows Wireshark to consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malform ...

The host is installed with Wireshark 3.4.0 through 3.4.5 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the DVB-S2-BB dissector issue. Successful exploitation allows Wireshark to consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Oracle Solaris 11 - ( CVE-2021-22222 )

The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle OUI data structures. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and application exit).

The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

The host is installed with Pidgin before 2.10.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted inline image in a message. Successful exploitation allows remote attackers to execute arbitrary code.

A vulnerability has been discovered and corrected in pidgin: Incorrect handing of inline images in incoming instant messages can cause a buffer overflow and in some cases can be exploited to execute arbitrary code . This update provides pidgin 2.10.6, which is not vulnerable to this issue.

Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. A flaw was found in the way the Pidgin MSN protocol plug-in processed text that was not encoded in UTF-8. A remote attacker could use this flaw to crash Pidgin by sending a specially-crafted MSN message. An input validation flaw was found in the way the Pidgin MSN pr ...


Pages:      Start    8568    8569    8570    8571    8572    8573    8574    8575    8576    8577    8578    8579    8580    8581    ..   19779

© SecPod Technologies