Beschreibung
Multiple vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Validation of untrusted input vulnerability in DOM can be exploited to bypass security restrictions.
- Implementation vulnerability in Gemini Live can be exploited to cause denial of service.
- Implementation vulnerability in Filesystems can be exploited to cause denial of service.
- Implementation vulnerability can be exploited to cause denial of service.
- Implementation vulnerability in Picture can be exploited to cause denial of service.
- Side-channel information leakage vulnerability in Navigation and Loading can be exploited to obtain sensitive information.
Ursprüngliche Informationshinweise
Betroffene Produkte
CVE Liste
- CVE-2025-8578 critical
- CVE-2025-8576 critical
- CVE-2025-8582 warning
- CVE-2025-8579 warning
- CVE-2025-8581 warning
- CVE-2025-8580 warning
- CVE-2025-8583 warning
- CVE-2025-8577 warning
- CVE-2025-13992 warning
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!