Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.8.2 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2013-4080
The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x prior to 1.8.8 does not properly handle a zero-length item, which allows remote malicious users to cause a denial of service (infinite loop, a...
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.7
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.6
5
CVSSv2
CVE-2013-4082
The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x prior to 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote malicious users to cause a denial of service (heap-based buffer overflo...
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.7
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.6
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Opensuse Opensuse 11.4
Debian Debian Linux 7.0
Opensuse Opensuse 12.3
Opensuse Opensuse 12.2
5
CVSSv2
CVE-2013-3555
epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x prior to 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Debian Debian Linux 7.0
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.6
Wireshark Wireshark 1.8.0
5
CVSSv2
CVE-2013-3558
The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x prior to 1.8.7 does not terminate a bit-field list, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.8.6
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Debian Debian Linux 7.0
5
CVSSv2
CVE-2013-3560
The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x prior to 1.8.7 uses an incorrect format string, which allows remote malicious users to cause a denial of service (application crash) via a malformed packe...
Opensuse Opensuse 11.4
Debian Debian Linux 7.0
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.6
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
5
CVSSv2
CVE-2013-3562
Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x prior to 1.8.7 allow remote malicious users to cause a denial of service (application crash) via a malformed packet.
Opensuse Opensuse 12.3
Opensuse Opensuse 11.4
Debian Debian Linux 7.0
Opensuse Opensuse 12.2
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
5
CVSSv2
CVE-2013-3556
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.13
Wireshark Wireshark 1.6.14
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.11
Opensuse Opensuse 12.2
Debian Debian Linux 7.0
Opensuse Opensuse 12.3
Opensuse Opensuse 11.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
6.1
CVSSv2
CVE-2013-2486
The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x prior to 1.8.6 uses an incorrect integer data type, which allows remote malicious users to cause a denial of service (infinit...
Opensuse Opensuse 12.3
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Debian Debian Linux 7.0
Opensuse Opensuse 11.4
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
3.3
CVSSv2
CVE-2013-2475
The TCP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
6.1
CVSSv2
CVE-2013-2476
The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (infinite loop) via a packet with a header that is too short.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.5
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »