Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-dmdz-e927-qkfb
Vulnerability ID VCID-dmdz-e927-qkfb
Aliases CVE-2014-2299
Summary several
Status Published
Exploitability 2.0
Weighted Severity 0.6
Risk 1.2
Affected and Fixed Packages Package Details
Weaknesses (1)
Data source Exploit-DB
Date added April 28, 2014
Description Wireshark 1.8.12/1.10.5 - wiretap/mpeg.c Stack Buffer Overflow (Metasploit)
Ransomware campaign use Known
Source publication date April 28, 2014
Exploit type local
Platform windows
Source update date April 28, 2014
Data source Metasploit
Description This module triggers a stack buffer overflow in Wireshark <= 1.8.12/1.10.5 by generating a malicious file.
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date March 20, 2014
Platform Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/fileformat/wireshark_mpeg_overflow.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.98577
EPSS Score 0.67962
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:10:36.307227+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 38.0.0