Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcpdump tcpdump vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2016-4969
Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote malicious users to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php.
Fortinet Fortiwan
8.8
CVSSv3
CVE-2016-4965
Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users with access to the nslookup functionality to execute arbitrary commands with root privileges via the graph parameter to diagnosis_control.php.
Fortinet Fortiwan
6.5
CVSSv3
CVE-2016-4966
The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
Fortinet Fortiwan
9.8
CVSSv3
CVE-2015-4852
The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote malicious users to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core....
Oracle Virtual Desktop Infrastructure
Oracle Weblogic Server 12.2.1.0.0
Oracle Weblogic Server 12.1.3.0.0
Oracle Weblogic Server 10.3.6.0.0
Oracle Weblogic Server 12.1.2.0.0
Oracle Storagetek Tape Analytics Sw Tool 2.3
2 EDB exploits
13 Github repositories
NA
CVE-2014-9140
Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and previous versions allows remote malicious users to cause a denial of service (crash) cia a crafted PPP packet.
Redhat Tcpdump
NA
CVE-2014-8767
Integer underflow in the olsr_print function in tcpdump 3.9.6 up to and including 4.6.2, when in verbose mode, allows remote malicious users to cause a denial of service (crash) via a crafted length value in an OLSR frame.
Redhat Tcpdump 4.6.1
Redhat Tcpdump 4.6.0
Redhat Tcpdump 4.2.1
Redhat Tcpdump 4.1.2
Redhat Tcpdump 4.5.0
Redhat Tcpdump 4.4.0
Redhat Tcpdump 3.9.8
Redhat Tcpdump 3.9.7
Redhat Tcpdump 4.6.2
Redhat Tcpdump 4.3.1
Redhat Tcpdump 4.3.0
Redhat Tcpdump 3.9.6
Redhat Tcpdump 4.5.2
Redhat Tcpdump 4.5.1
Redhat Tcpdump 4.1.1
Redhat Tcpdump 4.1.0
Redhat Tcpdump 4.0.0
NA
CVE-2014-8768
Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 up to and including 4.6.2, when in verbose mode, allow remote malicious users to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.2
Redhat Tcpdump 4.6.2
Redhat Tcpdump 4.6.0
Redhat Tcpdump 4.6.1
Redhat Tcpdump 4.5.1
Redhat Tcpdump 4.5.2
Redhat Tcpdump 4.5.0
1 EDB exploit
NA
CVE-2014-8769
tcpdump 3.8 up to and including 4.6.2 might allow remote malicious users to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memo...
Redhat Tcpdump 3.8.0
Redhat Tcpdump 3.8.2
Redhat Tcpdump 3.9.8
Redhat Tcpdump 4.0.0
Redhat Tcpdump 4.4.0
Redhat Tcpdump 4.5.0
Redhat Tcpdump 3.9.4
Redhat Tcpdump 3.9.5
Redhat Tcpdump 4.1.2
Redhat Tcpdump 4.2.1
Redhat Tcpdump 4.6.0
Redhat Tcpdump 4.6.1
Redhat Tcpdump 3.9.2
Redhat Tcpdump 3.9.3
Redhat Tcpdump 4.1.0
Redhat Tcpdump 4.1.1
Redhat Tcpdump 4.5.1
Redhat Tcpdump 4.5.2
Redhat Tcpdump 3.9.6
Redhat Tcpdump 3.9.7
Redhat Tcpdump 4.3.0
Redhat Tcpdump 4.3.1
NA
CVE-2013-3666
The LG Hidden Menu component for Android on the LG Optimus G E973 allows physically proximate malicious users to execute arbitrary commands by entering USB Debugging mode, using Android Debug Bridge (adb) to establish a USB connection, dialing 3845#*973#, modifying the WLAN Test ...
Google Android 4.1.2
Lg Optimus G E973 -
6.8
CVSSv3
CVE-2008-1447
The DNS protocol, as implemented in (1) BIND 8 and 9 prior to 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote malicious users to spoof DNS traffic via a birthday attack th...
Isc Bind 4
Isc Bind 8
Isc Bind 9.2.9
3 EDB exploits
4 Nmap scripts
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »