Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcpdump tcpdump vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv3
CVE-2019-1010220
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "pr...
Tcpdump Tcpdump 4.9.2
6.5
CVSSv3
CVE-2023-1801
The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.
Tcpdump Tcpdump 4.99.3
5.5
CVSSv3
CVE-2018-19519
In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.
Tcpdump Tcpdump 4.9.2
NA
CVE-2014-8768
Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 up to and including 4.6.2, when in verbose mode, allow remote malicious users to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.2
Redhat Tcpdump 4.6.2
Redhat Tcpdump 4.6.0
Redhat Tcpdump 4.6.1
Redhat Tcpdump 4.5.1
Redhat Tcpdump 4.5.2
Redhat Tcpdump 4.5.0
1 EDB exploit
NA
CVE-2003-0194
tcpdump does not properly drop privileges to the pcap user when starting up.
Redhat Tcpdump 3.6.3-3
Redhat Tcpdump 3.7.2-1
Redhat Tcpdump 3.4-39
Redhat Tcpdump 3.6.2-9
Redhat Tcpdump 3.6.2-12
Redhat Linux 7.1
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 8.0
7.5
CVSSv3
CVE-2015-3138
print-wb.c in tcpdump prior to 4.7.4 allows remote malicious users to cause a denial of service (segmentation fault and process crash).
Tcpdump Tcpdump
Opensuse Project Leap 42.1
Opensuse Leap 42.2
NA
CVE-2014-9140
Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and previous versions allows remote malicious users to cause a denial of service (crash) cia a crafted PPP packet.
Redhat Tcpdump
5.3
CVSSv3
CVE-2019-15162
rpcapd/daemon.c in libpcap prior to 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for malicious users to enumerate valid usernames.
Tcpdump Libpcap
5.3
CVSSv3
CVE-2019-15164
rpcapd/daemon.c in libpcap prior to 1.9.1 allows SSRF because a URL may be provided as a capture source.
Tcpdump Libpcap
9.8
CVSSv3
CVE-2011-1935
pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote malicious users to send arbitrary data while avoiding detection via crafted packets.
Tcpdump Libpcap
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »