Page 6 of 98 results (0.014 seconds)

CVSS: 5.0EPSS: 3%CPEs: 30EXPL: 0

Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors. Vulnerabilidad no especificada en el analizador AFS en Wireshark v0.9.2 a v1.2.0 permite a atacantes remotos provocar una denegación de servicio (caída) mediante vectores desconocidos. • http://secunia.com/advisories/35884 http://secunia.com/advisories/37477 http://www.debian.org/security/2009/dsa-1942 http://www.mandriva.com/security/advisories?name=MDVSA-2009:194 http://www.openwall.com/lists/oss-security/2009/09/17/15 http://www.openwall.com/lists/oss-security/2009/09/18/2 http://www.securityfocus.com/bid/35748 http://www.vupen.com/english/advisories/2009/1970 http://www.wireshark.org/docs/relnotes/wireshark-1.0.9.html http://www.wireshar • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets. Vulnerabilidad sin especificar en el analizador PCNFSD en Wireshark v0.8.20 hasta v1.0.7 permite a atacantes remotos provocar una denegación de servicio (caída) a través de paquetes PCNFSD manipulados. • http://osvdb.org/54629 http://secunia.com/advisories/35201 http://secunia.com/advisories/35224 http://secunia.com/advisories/35248 http://secunia.com/advisories/35464 http://secunia.com/advisories/37477 http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0095 http://www.debian.org/security/2009/dsa-1942 http://www.mandriva.com/security/advisories?name=MDVSA-2009:125 http://www.redhat.com/support/errata/RHSA-2009-1100.html http://www.securityfocus.com/bid/35081 http:/&#x •

CVSS: 10.0EPSS: 0%CPEs: 45EXPL: 0

Unspecified vulnerability in Wireshark before 1.0.7 has unknown impact and attack vectors. Vulnerabilidad inespecífica en Wireshark anteriores a v1.0.7-0.1-1 tiene un impacto y vectores desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/34778 http://secunia.com/advisories/35416 http://wiki.rpath.com/Advisories:rPSA-2009-0062 http://www.securityfocus.com/archive/1/502745/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/50334 •

CVSS: 5.0EPSS: 0%CPEs: 17EXPL: 0

Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors. Vulnerabilidad no especificada en el analizador de LDAP de Wireshark desde la versión v0.99.2 hasta la v1.0.6, cuando se ejecuta en Windows, permite a usuarios remotos provocar una denegación de servicio (caída del servicio) a través de vectores de ataque desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/34778 http://secunia.com/advisories/35416 http://wiki.rpath.com/Advisories:rPSA-2009-0062 http://www.securityfocus.com/archive/1/502745/100/0/threaded http://www.securityfocus.com/bid/34457 http://www.securitytracker.com/id?1022027 http://www.wireshark.org/security/wnpa-sec-2009-02.html https://exchange.xforce.ibmcloud.com/vulnerabilities/49814 https://oval.cisecurity.org/repository •

CVSS: 4.3EPSS: 0%CPEs: 22EXPL: 0

The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet. Vulnerabilidad en el analizador del protocolo Check Point High-Availability Protocol (CPHAP) de Wireshark desde la versión v0.0.6 hasta la v1.0.6 permite a usuarios remotos causar una denegación de servicio (caída del servicio) a través de un paquete FWHA_MY_STATE modificado. • http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/34778 http://secunia.com/advisories/34970 http://secunia.com/advisories/35133 http://secunia.com/advisories/35224 http://secunia.com/advisories/35416 http://secunia.com/advisories/35464 http://secunia.com/advisories/37477 http://wiki.rpath.com/Advisories:rPSA-2009-0062 http://www.debian.org/security/2009/dsa-1785 http://www.debian.org/security/2009/dsa-1942 http:// • CWE-20: Improper Input Validation •