Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.2.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2009-3551
Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector in Wireshark 1.2.0 up to and including 1.2.2 allows remote malicious users to cause a denial of service (application crash) via a file that records a malformed packet trace. NOTE: some ...
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.2.1
Wireshark Wireshark 1.2
5
CVSSv2
CVE-2009-3549
packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 up to and including 1.2.2, on SPARC and certain other platforms, allows remote malicious users to cause a denial of service (application crash) via a file that records a malformed packet trace.
Wireshark Wireshark 1.2.1
Wireshark Wireshark 1.2
Wireshark Wireshark 1.2.0
5
CVSSv2
CVE-2009-3242
Unspecified vulnerability in packet.c in the GSM A RR dissector in Wireshark 1.2.0 and 1.2.1 allows remote malicious users to cause a denial of service (application crash) via unknown vectors related to "an uninitialized dissector handle," which triggers an assertion fa...
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.2.1
1 EDB exploit
5
CVSSv2
CVE-2009-3243
Unspecified vulnerability in the TLS dissector in Wireshark 1.2.0 and 1.2.1, when running on Windows, allows remote malicious users to cause a denial of service (application crash) via unknown vectors related to TLS 1.2 conversations.
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.2.1
1 EDB exploit
7.1
CVSSv2
CVE-2009-2563
Unspecified vulnerability in the Infiniband dissector in Wireshark 1.0.6 up to and including 1.2.0, when running on unspecified platforms, allows remote malicious users to cause a denial of service (crash) via unknown vectors.
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.0.8
Wireshark Wireshark 1.0.6
Wireshark Wireshark 1.0.7
9.3
CVSSv2
CVE-2009-4376
Buffer overflow in the daintree_sna_read function in the Daintree SNA file parser in Wireshark 1.2.0 up to and including 1.2.4 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
Wireshark Wireshark 1.2.2
Wireshark Wireshark 1.2.3
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.2.1
Wireshark Wireshark 1.2.4
4.3
CVSSv2
CVE-2009-4378
The IPMI dissector in Wireshark 1.2.0 up to and including 1.2.4 on Windows allows remote malicious users to cause a denial of service (crash) via a crafted packet, related to "formatting a date/time using strftime."
Wireshark Wireshark 1.2.3
Wireshark Wireshark 1.2.4
Wireshark Wireshark 1.2.1
Wireshark Wireshark 1.2.2
Wireshark Wireshark 1.2.0
5
CVSSv2
CVE-2009-2561
Unspecified vulnerability in the sFlow dissector in Wireshark 1.2.0 allows remote malicious users to cause a denial of service (CPU and memory consumption) via unspecified vectors.
Wireshark Wireshark 1.2.0
5
CVSSv2
CVE-2009-2559
Buffer overflow in the IPMI dissector in Wireshark 1.2.0 allows remote malicious users to cause a denial of service (crash) via unspecified vectors related to an array index error. NOTE: some of these details are obtained from third party information.
Wireshark Wireshark 1.2.0
5
CVSSv2
CVE-2009-2560
Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote malicious users to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was late...
Wireshark Wireshark 1.0.5
Wireshark Wireshark 1.0.7
Wireshark Wireshark 1.0.1
Wireshark Wireshark 1.0.4
Wireshark Wireshark 1.0.8
Wireshark Wireshark 1.0.6
Wireshark Wireshark 1.0.3
Wireshark Wireshark 1.0.0
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.0.9
Wireshark Wireshark 1.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-21111
CVE-2024-32884
IDOR
CVE-2023-1000
CVE-2024-33260
CVE-2024-3682
reflected XSS
race condition
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »