Page 16 of 122 results (0.014 seconds)

CVSS: 5.0EPSS: 0%CPEs: 11EXPL: 0

The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors. NOTE: this might be due to a use-after-free error. El analizador RTMPT en Wireshark (anteriormente Ethereal) 0.99.8 a la v1.0.0, permite a atacantes remotos provocar una denegación de servicio (caída) a través de vectores desconocidos. NOTA: esto puede ser debido a un eror "user-after-free" (uso después de liberación). • http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html http://secunia.com/advisories/30886 http://secunia.com/advisories/30942 http://secunia.com/advisories/31085 http://secunia.com/advisories/31378 http://secunia.com/advisories/31687 http://security.gentoo.org/glsa/glsa-200808-04.xml http://securitytracker.com/id?1020404 http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0212 http://www.securityfocus.com/archive/1/493882/100/0/threaded http://www.securityfocus • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 10EXPL: 1

The GSM SMS dissector in Wireshark (formerly Ethereal) 0.99.2 through 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors. El analizador GSM SMS en Wireshark (anteriormente Ethereal) 0.99.2 a la v1.0.0, permite a atacantes remotos provocar una denegación de servicio (caída) a través de vectores desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html http://secunia.com/advisories/30886 http://secunia.com/advisories/30942 http://secunia.com/advisories/31085 http://secunia.com/advisories/31378 http://secunia.com/advisories/31687 http://secunia.com/advisories/32091 http://secunia.com/advisories/32944 http://security.gentoo.org/glsa/glsa-200808-04.xml http://securitytracker.com/id?1020404 http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http:& • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 1

The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740. El analizador LDAP en Wireshark (anteriormente Ethereal) de 0.99.2 a 0.99.8 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete mal formado, una vulnerabilidad distinta a CVE-2006-5740. • https://www.exploit-db.com/exploits/31553 http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html http://secunia.com/advisories/29569 http://secunia.com/advisories/29622 http://secunia.com/advisories/29695 http://secunia.com/advisories/29736 http://secunia.com/advisories/29971 http://secunia.com/advisories/32091 http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138 http://www.gentoo.org/security/ • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 2

Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) 0.99.5 through 0.99.8 allow remote attackers to cause a denial of service (application crash) via a malformed packet to the (1) X.509sat or (2) Roofnet dissectors. NOTE: Vector 2 might also lead to a hang. Múltiples vulnerabilidades no especificadas en Wireshark (anteriormente Ethereal) de 0.99.5 a 0.99.8 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete mal formado a los analizadores(1) X.509sat o (2) Roofnet. NOTA: el vector 2 podría llevar también a un cuelgue. • https://www.exploit-db.com/exploits/31552 http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html http://secunia.com/advisories/29569 http://secunia.com/advisories/29622 http://secunia.com/advisories/29695 http://secunia.com/advisories/29736 http://secunia.com/advisories/29971 http://secunia.com/advisories/32091 http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138 http://www.gentoo.org/security/ •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 2

The "decode as" feature in packet-bssap.c in the SCCP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet. La característica "decode as" (descodificar como) en packet-bssap.c del analizador SCCP en Wireshark (anteriormente Ethereal) de 0.99.6 a 0.99.8 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete mal formado. • https://www.exploit-db.com/exploits/31554 http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html http://secunia.com/advisories/29569 http://secunia.com/advisories/29622 http://secunia.com/advisories/29695 http://secunia.com/advisories/29736 http://secunia.com/advisories/29971 http://secunia.com/advisories/32091 http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138 http://www.gentoo.org/security/ •