Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2012-5240
Buffer overflow in the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector in Wireshark 1.8.x prior to 1.8.3 allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a malformed packet.
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.0
5.8
CVSSv2
CVE-2012-4294
Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x prior to 1.8.2 allows remote malicious users to execute arbitrary code via a large speed (aka rate) value.
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Sun Sunos 5.11
5.8
CVSSv2
CVE-2012-0043
Buffer overflow in the reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.4.x prior to 1.4.11 and 1.6.x prior to 1.6.5 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code vi...
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.10
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
5.4
CVSSv2
CVE-2012-4298
Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x prior to 1.8.2 allows user-assisted remote malicious users to execute arbitrary code via a crafted packet-trace file that triggers a buffer o...
Sun Sunos 5.11
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.0
5.4
CVSSv2
CVE-2006-4333
The SSCOP dissector in Wireshark (formerly Ethereal) prior to 0.99.3 allows remote malicious users to cause a denial of service (resource consumption) via malformed packets that cause the Q.2391 dissector to use excessive memory.
Wireshark Wireshark 0.99
Wireshark Wireshark 0.99.1
Wireshark Wireshark 0.10.13
Wireshark Wireshark 0.10.4
Wireshark Wireshark 0.99.2
5
CVSSv2
CVE-2022-0581
Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
Wireshark Wireshark
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 9.0
5
CVSSv2
CVE-2022-0583
Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
Wireshark Wireshark
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 9.0
5
CVSSv2
CVE-2021-4186
Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Wireshark Wireshark
Fedoraproject Fedora 34
Fedoraproject Fedora 35
5
CVSSv2
CVE-2021-4181
Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Wireshark Wireshark 3.6.0
Wireshark Wireshark
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 9.0
Oracle Http Server 12.2.1.3.0
Oracle Http Server 12.2.1.4.0
Oracle Zfs Storage Appliance Kit 8.8
5
CVSSv2
CVE-2021-4182
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Wireshark Wireshark 3.6.0
Wireshark Wireshark
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Oracle Http Server 12.2.1.3.0
Oracle Http Server 12.2.1.4.0
Oracle Zfs Storage Appliance Kit 8.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »