7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
31.7%
The vulnerability of Wireshark traffic analysis software is related to insufficient verification of user input data in the CBOR protocol dissector.
data entered by the user in the CBOR protocol dissector. Exploitation of the vulnerability could allow an attacker,
acting remotely, pass specially crafted input data to the application and execute a denial-of-service attack.
"denial of service
A vulnerability in the traffic analysis software Wireshark is related to an infinite loop in the Bluetooth dissector
SDP. Exploitation of the vulnerability could allow an attacker acting remotely to utilize all of the
available system resources and cause a denial of service.
A vulnerability in Wireshark traffic analysis software is related to a memory leak in the Bluetooth SDP dissector.
Exploitation of the vulnerability could allow an attacker acting remotely to cause the application to cause a
memory leak and perform a denial of service attack.
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
31.7%