Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcpdump libpcap vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-15164
rpcapd/daemon.c in libpcap prior to 1.9.1 allows SSRF because a URL may be provided as a capture source.
Tcpdump Libpcap
5
CVSSv2
CVE-2019-15165
sf-pcapng.c in libpcap prior to 1.9.1 does not properly validate the PHB header length before allocating memory.
Tcpdump Libpcap
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 15.0
Opensuse Leap 15.1
Oracle Communications Operations Monitor 3.4
Oracle Communications Operations Monitor 4.0
Oracle Communications Operations Monitor 4.2
Oracle Communications Operations Monitor 4.1
Oracle Communications Operations Monitor 4.3
Apple Mac Os X 10.13.6
Apple Mac Os X 10.14.6
Apple Mac Os X 10.15.2
Apple Mac Os X
Apple Tvos 13.3
Apple Watchos 6.1.1
Apple Iphone Os 13.3
Apple Ipados 13.3
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
5
CVSSv2
CVE-2019-15161
rpcapd/daemon.c in libpcap prior to 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.
Tcpdump Libpcap
5
CVSSv2
CVE-2019-15163
rpcapd/daemon.c in libpcap prior to 1.9.1 allows malicious users to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
Tcpdump Libpcap
5
CVSSv2
CVE-2019-15162
rpcapd/daemon.c in libpcap prior to 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for malicious users to enumerate valid usernames.
Tcpdump Libpcap
4.4
CVSSv2
CVE-2018-16301
The command-line argument parser in tcpdump prior to 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of...
Tcpdump Tcpdump
7.5
CVSSv2
CVE-2011-1935
pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote malicious users to send arbitrary data while avoiding detection via crafted packets.
Tcpdump Libpcap
5
CVSSv2
CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 prior to 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote malicious users to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrat...
Openssl Openssl
Filezilla-project Filezilla Server
Siemens Application Processing Engine Firmware 2.0
Siemens Cp 1543-1 Firmware 1.1
Siemens Simatic S7-1500 Firmware 1.5
Siemens Simatic S7-1500t Firmware 1.5
Siemens Elan-8.2
Siemens Wincc Open Architecture 3.12
Intellian V100 Firmware 1.20
Intellian V100 Firmware 1.21
Intellian V100 Firmware 1.24
Intellian V60 Firmware 1.15
Intellian V60 Firmware 1.25
Mitel Micollab 6.0
Mitel Micollab 7.0
Mitel Micollab 7.1
Mitel Micollab 7.2
Mitel Micollab 7.3.0.104
Mitel Micollab 7.3
Mitel Mivoice 1.1.3.3
Mitel Mivoice 1.2.0.11
Mitel Mivoice 1.3.2.2
4 EDB exploits
2 Nmap scripts
306 Github repositories
4 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started