Page 102 of 533 results (0.023 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors. El DCP ETSI dissector en Wireshark (formalmente Ethereal) 0.99.6 permite que atacantes remotos provoquen una denegación de servicio(por bucle de larga duración y consumo de recursos) usando vectores desconocidos. • http://bugs.gentoo.org/show_bug.cgi?id=199958 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html http://secunia.com/advisories/27777 http://secunia.com/advisories/28197 http://secunia.com/advisories/28207 http://secunia.com/advisories/28288 http://secunia.com/advisories/28304 http://secunia.com/advisories/28325 http://secunia.com/advisories/28564 http://secunia.com/advisories/29048 http://security.gentoo.org/glsa/glsa-200712-23.xml http://securitytra •

CVSS: 7.1EPSS: 0%CPEs: 69EXPL: 0

Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector. Múltiples vulnerabilidades no especificadas en Wireshark (formalmente Ethereal) que permiten que atacantes remotos provoquen una denegación de servicio (por caída) usando: (1) un fichero MP3 manipulado, o (2) vectores no especificados en el NCP dissector. • http://bugs.gentoo.org/show_bug.cgi?id=199958 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html http://secunia.com/advisories/27777 http://secunia.com/advisories/28197 http://secunia.com/advisories/28207 http://secunia.com/advisories/28288 http://secunia.com/advisories/28304 http://secunia.com/advisories/28325 http://secunia.com/advisories/28564 http://secunia.com/advisories/29048 http://security.gentoo.org/glsa/glsa-200712-23.xml http://securitytra •

CVSS: 4.3EPSS: 3%CPEs: 32EXPL: 1

Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet. Un error en la propiedad signedness de enteros en el disector de DNP3 en Wireshark (anteriormente Ethereal) versiones 0.10.12 hasta 0.99.6, permite a atacantes remotos causar una denegación de servicio (bucle largo) por medio de un paquete DNP3 malformado. • https://www.exploit-db.com/exploits/4347 http://bugs.gentoo.org/show_bug.cgi?id=199958 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html http://secunia.com/advisories/27777 http://secunia.com/advisories/28197 http://secunia.com/advisories/28207 http://secunia.com/advisories/28288 http://secunia.com/advisories/28304 http://secunia.com/advisories/28325 http://secunia.com/advisories/28564 http://secunia.com/advisories/28583 http://secunia.com/advisori • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 11%CPEs: 2EXPL: 0

Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors. Desbordamiento de buffer en el ANSI MAP dissector para Wireshark (formalmente Ethereal), desde la versión 0.99.5 a la 0.99.6. Cuando se ejecuta en plataformas no especificadas, permite que atacantes remotos causen una denegación de servicio y, posiblemente, que ejecuten código de su elección, utilizando vectores desconocidos. • http://bugs.gentoo.org/show_bug.cgi?id=199958 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html http://secunia.com/advisories/27777 http://secunia.com/advisories/28197 http://secunia.com/advisories/28207 http://secunia.com/advisories/28288 http://secunia.com/advisories/28304 http://secunia.com/advisories/28325 http://secunia.com/advisories/28564 http://secunia.com/advisories/28583 http://secunia.com/advisories/29048 http://security.gentoo.org/glsa/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 6%CPEs: 8EXPL: 0

Multiple buffer overflows in Wireshark (formerly Ethereal) 0.99.0 through 0.99.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) the SSL dissector or (2) the iSeries (OS/400) Communication trace file parser. Múltiples desbordamientos de buffer en Wireshark (formalmente Ethereal), desde la versión 0.99.0 a la 0.99.6. Permiten que atacantes remotos provoquen una denegación de servicio (por caída) y que posiblemente ejecuten código de su elección usando: (1) el SSL dissector, o (2) el parseador del fichero de trazas iSeries (OS/400) Communication. • http://bugs.gentoo.org/show_bug.cgi?id=199958 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html http://secunia.com/advisories/27777 http://secunia.com/advisories/27817 http://secunia.com/advisories/28197 http://secunia.com/advisories/28207 http://secunia.com/advisories/28288 http://secunia.com/advisories/28304 http://secunia.com/advisories/28325 http://secunia.com/advisories/28564 http://secunia.com/advisories/28583 http://secunia.com/advisories/29048 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •