Search CVE reports
1071 – 1080 of 39749 results
SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 affected package
wireshark
| Package | 22.04 LTS |
|---|---|
| wireshark | Needs evaluation |
FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 affected package
wireshark
| Package | 22.04 LTS |
|---|---|
| wireshark | Needs evaluation |
TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
1 affected package
wireshark
| Package | 22.04 LTS |
|---|---|
| wireshark | Needs evaluation |
AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 affected package
wireshark
| Package | 22.04 LTS |
|---|---|
| wireshark | Needs evaluation |
ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 affected package
wireshark
| Package | 22.04 LTS |
|---|---|
| wireshark | Needs evaluation |
For a server using an RSA key backed by a PKCS#11 token, a client sending an extremely short premaster secret during an RSA key exchange could trigger a short heap overread.
1 affected package
gnutls28
| Package | 22.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Appending to a PKCS#12 bag that already contained 32 elements could write past the bag's internal array.
1 affected package
gnutls28
| Package | 22.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Changing the Security Officer PIN with gnutls_pkcs11_token_set_pin() with oldpin == NULL for a token lacking a protected authentication path led to a use-after-free.
1 affected package
gnutls28
| Package | 22.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Validation of certificates with oversized Subject Alternative Names would fall back to checking DNS hostnames against Common Name.
1 affected package
gnutls28
| Package | 22.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Certificates containing URI or SRV Subject Alternative Names would fall back to checking DNS hostnames against Common Name, allowing potential misuse of such certificates beyond their original purpose.
1 affected package
gnutls28
| Package | 22.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |