Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 2.0.0 vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2016-2524
epan/dissectors/packet-x509af.c in the X.509AF dissector in Wireshark 2.0.x prior to 2.0.2 mishandles the algorithm ID, which allows remote malicious users to cause a denial of service (application crash) via a crafted packet.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
5.9
CVSSv3
CVE-2016-2525
epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x prior to 2.0.2 does not limit the amount of header data, which allows remote malicious users to cause a denial of service (memory consumption or application crash) via a crafted packet.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
5.5
CVSSv3
CVE-2016-2529
The iseries_check_file_type function in wiretap/iseries.c in the iSeries file parser in Wireshark 2.0.x prior to 2.0.2 does not consider that a line may lack the "OBJECT PROTOCOL" substring, which allows remote malicious users to cause a denial of service (out-of-bounds...
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
5.5
CVSSv3
CVE-2016-2527
wiretap/nettrace_3gpp_32_423.c in the 3GPP TS 32.423 Trace file parser in Wireshark 2.0.x prior to 2.0.2 does not ensure that a '\0' character is present at the end of certain strings, which allows remote malicious users to cause a denial of service (stack-based buffer ...
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
5.9
CVSSv3
CVE-2016-2528
The dissect_nhdr_extopt function in epan/dissectors/packet-lbmc.c in the LBMC dissector in Wireshark 2.0.x prior to 2.0.2 does not validate length values, which allows remote malicious users to cause a denial of service (stack-based buffer overflow and application crash) via a cr...
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
5.9
CVSSv3
CVE-2016-4420
The NFS dissector in Wireshark 2.x prior to 2.0.2 allows remote malicious users to cause a denial of service (application crash) via a crafted packet.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
5.9
CVSSv3
CVE-2016-6512
epan/dissectors/packet-wap.c in Wireshark 2.x prior to 2.0.5 omits an overflow check in the tvb_get_guintvar function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet, related to the MMSE, WAP, WBXML, and WSP dissectors.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.4
Wireshark Wireshark 2.0.1
Wireshark Wireshark 2.0.2
Wireshark Wireshark 2.0.3
1 EDB exploit
5.9
CVSSv3
CVE-2016-6503
The CORBA IDL dissectors in Wireshark 2.x prior to 2.0.5 on 64-bit Windows platforms do not properly interact with Visual C++ compiler options, which allows remote malicious users to cause a denial of service (application crash) via a crafted packet.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.4
Wireshark Wireshark 2.0.1
Wireshark Wireshark 2.0.2
Wireshark Wireshark 2.0.3
1 EDB exploit
5.9
CVSSv3
CVE-2016-6513
epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 2.x prior to 2.0.5 does not restrict the recursion depth, which allows remote malicious users to cause a denial of service (application crash) via a crafted packet.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.4
Wireshark Wireshark 2.0.1
Wireshark Wireshark 2.0.2
Wireshark Wireshark 2.0.3
5.9
CVSSv3
CVE-2016-5358
epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x prior to 2.0.4 mishandles the packet-header data type, which allows remote malicious users to cause a denial of service (application crash) via a crafted packet.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
Wireshark Wireshark 2.0.2
Wireshark Wireshark 2.0.3
Oracle Solaris 11.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »