Page 5 of 60 results (0.004 seconds)

CVSS: 5.0EPSS: 3%CPEs: 30EXPL: 0

Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors. Vulnerabilidad no especificada en el analizador AFS en Wireshark v0.9.2 a v1.2.0 permite a atacantes remotos provocar una denegación de servicio (caída) mediante vectores desconocidos. • http://secunia.com/advisories/35884 http://secunia.com/advisories/37477 http://www.debian.org/security/2009/dsa-1942 http://www.mandriva.com/security/advisories?name=MDVSA-2009:194 http://www.openwall.com/lists/oss-security/2009/09/17/15 http://www.openwall.com/lists/oss-security/2009/09/18/2 http://www.securityfocus.com/bid/35748 http://www.vupen.com/english/advisories/2009/1970 http://www.wireshark.org/docs/relnotes/wireshark-1.0.9.html http://www.wireshar • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets. Vulnerabilidad sin especificar en el analizador PCNFSD en Wireshark v0.8.20 hasta v1.0.7 permite a atacantes remotos provocar una denegación de servicio (caída) a través de paquetes PCNFSD manipulados. • http://osvdb.org/54629 http://secunia.com/advisories/35201 http://secunia.com/advisories/35224 http://secunia.com/advisories/35248 http://secunia.com/advisories/35464 http://secunia.com/advisories/37477 http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0095 http://www.debian.org/security/2009/dsa-1942 http://www.mandriva.com/security/advisories?name=MDVSA-2009:125 http://www.redhat.com/support/errata/RHSA-2009-1100.html http://www.securityfocus.com/bid/35081 http:/&#x •

CVSS: 10.0EPSS: 0%CPEs: 45EXPL: 0

Unspecified vulnerability in Wireshark before 1.0.7 has unknown impact and attack vectors. Vulnerabilidad inespecífica en Wireshark anteriores a v1.0.7-0.1-1 tiene un impacto y vectores desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/34778 http://secunia.com/advisories/35416 http://wiki.rpath.com/Advisories:rPSA-2009-0062 http://www.securityfocus.com/archive/1/502745/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/50334 •

CVSS: 4.3EPSS: 0%CPEs: 22EXPL: 0

The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet. Vulnerabilidad en el analizador del protocolo Check Point High-Availability Protocol (CPHAP) de Wireshark desde la versión v0.0.6 hasta la v1.0.6 permite a usuarios remotos causar una denegación de servicio (caída del servicio) a través de un paquete FWHA_MY_STATE modificado. • http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/34778 http://secunia.com/advisories/34970 http://secunia.com/advisories/35133 http://secunia.com/advisories/35224 http://secunia.com/advisories/35416 http://secunia.com/advisories/35464 http://secunia.com/advisories/37477 http://wiki.rpath.com/Advisories:rPSA-2009-0062 http://www.debian.org/security/2009/dsa-1785 http://www.debian.org/security/2009/dsa-1942 http:// • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 22EXPL: 0

Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file. Una vulnerabilidad sin especificar en Wireshark 0.99.6 a 1.0.6 permite a atacantes remotos provocar una denegación de servicio (con caída de la aplicación) a través de un archivo Tektronix .rf5 debidamente modificado. • http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/34778 http://secunia.com/advisories/34970 http://secunia.com/advisories/35133 http://secunia.com/advisories/35224 http://secunia.com/advisories/35416 http://secunia.com/advisories/35464 http://wiki.rpath.com/Advisories:rPSA-2009-0062 http://www.debian.org/security/2009/dsa-1785 http://www.mandriva.com/security/advisories?name=MDVSA-2009:088 http://www.redhat.com/support/e •