Filtered by vendor Wireshark
Subscriptions
Filtered by product Wireshark
Subscriptions
Total
668 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-0417 | 1 Wireshark | 1 Wireshark | 2024-08-02 | 6.3 Medium |
Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file | ||||
CVE-2023-0414 | 1 Wireshark | 1 Wireshark | 2024-08-02 | 6.3 Medium |
Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file | ||||
CVE-2023-0415 | 1 Wireshark | 1 Wireshark | 2024-08-02 | 6.3 Medium |
iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file | ||||
CVE-2023-0413 | 1 Wireshark | 1 Wireshark | 2024-08-02 | 6.3 Medium |
Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file | ||||
CVE-2023-0411 | 1 Wireshark | 1 Wireshark | 2024-08-02 | 6.3 Medium |
Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file | ||||
CVE-2023-0416 | 1 Wireshark | 1 Wireshark | 2024-08-02 | 6.3 Medium |
GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file | ||||
CVE-2023-0412 | 2 Debian, Wireshark | 2 Debian Linux, Wireshark | 2024-08-02 | 6.3 Medium |
TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file | ||||
CVE-2024-24478 | 1 Wireshark | 1 Wireshark | 2024-08-02 | 7.5 High |
An issue in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the packet-bgp.c, dissect_bgp_open(tvbuff_t*tvb, proto_tree*tree, packet_info*pinfo), optlen components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected. |