cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-27785,https://securityvulnerability.io/vulnerability/CVE-2023-27785,Denial of Service Issue in TCPreplay TCPprep by Appneta,"A vulnerability in TCPreplay's TCPprep version 4.4.3 allows remote attackers to trigger a denial of service condition via the parse endpoints function. This can potentially disrupt service availability, highlighting the need for users to apply security patches promptly and take necessary precautions to safeguard their systems.",Broadcom,Tcpreplay,7.5,HIGH,0.004410000052303076,false,,false,false,false,,,false,false,,2023-03-16T00:00:00.000Z,0 CVE-2023-27786,https://securityvulnerability.io/vulnerability/CVE-2023-27786,Denial of Service Vulnerability in TCPprep by AppNeta,"A vulnerability has been identified in TCPprep version 4.4.3 which allows a remote attacker to execute a denial of service attack through the macinstring function. This issue can lead to service interruptions, potentially impacting system availability. Users of TCPprep should be vigilant and apply recommended patches to mitigate this risk.",Broadcom,Tcpreplay,7.5,HIGH,0.004860000219196081,false,,false,false,false,,,false,false,,2023-03-16T00:00:00.000Z,0 CVE-2023-27788,https://securityvulnerability.io/vulnerability/CVE-2023-27788,Denial of Service Vulnerability in TCPrewrite by AppNeta,A vulnerability has been identified in TCPrewrite version 4.4.3 that allows a remote attacker to exploit the ports2PORT function. This exploitation can lead to a denial of service condition due to improper handling of inputs at the endpoint located in portmap.c:69. Organizations using this version should take immediate action to mitigate risks associated with this vulnerability.,Broadcom,Tcpreplay,7.5,HIGH,0.004509999882429838,false,,false,false,false,,,false,false,,2023-03-16T00:00:00.000Z,0 CVE-2023-27787,https://securityvulnerability.io/vulnerability/CVE-2023-27787,Denial of Service Vulnerability in TCPprep by AppNeta,"A vulnerability in TCPprep version 4.4.3 allows remote attackers to exploit the parse_list function at line 81 within the list.c file. This could lead to a denial of service, interrupting normal operation and potentially impacting the availability of network resources.",Broadcom,Tcpreplay,7.5,HIGH,0.004410000052303076,false,,false,false,false,,,false,false,,2023-03-16T00:00:00.000Z,0 CVE-2023-27784,https://securityvulnerability.io/vulnerability/CVE-2023-27784,Denial of Service Vulnerability in TCPReplay by AppNeta,"A vulnerability in TCPReplay version 4.4.3 has been identified that allows a remote attacker to exploit the read_hexstring function, potentially leading to a denial of service condition. This issue, located within the utils.c file at line 309, could be triggered by sending specially crafted inputs, thereby disrupting normal operations and affecting service availability.",Broadcom,Tcpreplay,7.5,HIGH,0.004410000052303076,false,,false,false,false,,,false,false,,2023-03-16T00:00:00.000Z,0 CVE-2023-27783,https://securityvulnerability.io/vulnerability/CVE-2023-27783,Denial of Service Vulnerability in tcpreplay by AppNeta,"A vulnerability exists in tcpreplay's tcprewrite component, version 4.4.3, which can be exploited by remote attackers to cause a denial of service. This issue arises from improper handling in the tcpedit_dlt_cleanup function located in the dlt_plugins.c file. If exploited, attackers could disrupt service availability, impacting users relying on this network tool for packet editing.",Broadcom,Tcpreplay,7.5,HIGH,0.0049600000493228436,false,,false,false,false,,,false,false,,2023-03-16T00:00:00.000Z,0 CVE-2023-27789,https://securityvulnerability.io/vulnerability/CVE-2023-27789,Remote Denial of Service Vulnerability in TCPprep by AppNeta,"A vulnerability has been identified in TCPprep v.4.4.3 that can be exploited by a remote attacker to trigger a denial of service condition. This occurs through the 'cidr2cidr' function implemented in the cidr.c file at line 178. Successful exploitation may lead to interruptions in network service, affecting the overall performance and availability of affected systems. It is essential for users of TCPprep to review their current version and apply necessary patches to mitigate this risk.",Broadcom,Tcpreplay,7.5,HIGH,0.0049600000493228436,false,,false,false,false,,,false,false,,2023-03-16T00:00:00.000Z,0 CVE-2022-37049,https://securityvulnerability.io/vulnerability/CVE-2022-37049,Heap-based buffer overflow in Tcpreplay affects multiple versions,"A heap-based buffer overflow vulnerability has been identified in the Tcpreplay tool, specifically in the tcpprep component. The flaw resides in the parse_mpls function located at common/get.c:150, allowing attackers to potentially manipulate memory and execute arbitrary code. This vulnerability could lead to serious security risks, particularly when processing maliciously crafted MPLS data packets. It is crucial for users of Tcpreplay, especially version 4.4.1, to stay informed about updates and patches to mitigate associated risks.",Broadcom,Tcpreplay,7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2022-37047,https://securityvulnerability.io/vulnerability/CVE-2022-37047,Heap-based buffer overflow in Tcpreplay v4.4.1 affecting multiple Linux distributions,"A heap-based buffer overflow vulnerability has been identified in the tcprewrite component of Tcpreplay version 4.4.1. This flaw, located in the get_ipv6_next function at common/get.c:713, poses a risk to users and could potentially allow malicious actors to execute arbitrary code. It's crucial for system administrators and cybersecurity professionals to address this vulnerability to protect network devices and applications relying on Tcpreplay.",Broadcom,Tcpreplay,7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2022-37048,https://securityvulnerability.io/vulnerability/CVE-2022-37048,Heap-based Buffer Overflow in Tcpreplay by AppNeta,"A vulnerability has been identified in Tcpreplay version 4.4.1 wherein the tcprewrite component contains a heap-based buffer overflow within the get_l2len_protocol function located in common/get.c:344. This flaw could potentially allow an attacker to exploit memory corruption and may lead to unexpected behavior, increasing the risk of remote code execution. It is critical for users of this product to apply the recommended security updates and monitoring measures to safeguard their systems.",Broadcom,Tcpreplay,7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2022-28487,https://securityvulnerability.io/vulnerability/CVE-2022-28487,Memory Leakage Flaw in Tcpreplay Affects Data Confidentiality,"Tcpreplay version 4.4.1 has a critical memory leakage flaw in the fix_ipv6_checksums() function, which can potentially lead to the exposure of sensitive data. This vulnerability poses significant risks to data confidentiality, making it essential for users to review their implementations and apply necessary updates and patches promptly.",Broadcom,Tcpreplay,7.5,HIGH,0.0029800001066178083,false,,false,false,false,,,false,false,,2022-05-04T00:00:00.000Z,0 CVE-2022-27418,https://securityvulnerability.io/vulnerability/CVE-2022-27418,Heap-Based Buffer Overflow in Tcpreplay by Appneta,"Tcpreplay, a tool used for editing and replaying network traffic, has a vulnerability in version 4.4.1 that introduces a heap-based buffer overflow in the function do_checksum_math located in /tcpedit/checksum.c. This flaw could potentially allow an attacker to manipulate memory leading to unexpected behaviors or execution of arbitrary code. Users of this version should update to mitigate any security risks associated with this vulnerability. More details can be found in the referenced vendor advisory.",Broadcom,Tcpreplay,7.8,HIGH,0.00107999995816499,false,,false,false,false,,,false,false,,2022-04-12T00:00:00.000Z,0 CVE-2022-27416,https://securityvulnerability.io/vulnerability/CVE-2022-27416,Double-Free Vulnerability in Tcpreplay Software from AppNeta,"A double-free vulnerability was identified in Tcpreplay v4.4.1, which could lead to application instability and potential exploitation. This security flaw, occurring via the __interceptor_free method, can be triggered through improper memory management, making it crucial for users to update to a patched version to maintain security integrity. Refer to the official advisories and documentation to understand the specifics of the vulnerability and the necessary mitigations.",Broadcom,Tcpreplay,7.8,HIGH,0.0007800000021234155,false,,false,false,false,,,false,false,,2022-04-12T00:00:00.000Z,0 CVE-2022-27941,https://securityvulnerability.io/vulnerability/CVE-2022-27941,Heap-Based Buffer Over-Read in Tcpreplay by AppNeta,"Tcpreplay version 4.4.1 contains a heap-based buffer over-read vulnerability identified in the `get_l2len_protocol` function within the `common/get.c` file. This flaw can potentially be exploited by an attacker, leading to unintended data exposure or denial of service. Users of affected versions should review their configurations and apply necessary updates to mitigate any risks associated with this vulnerability.",Broadcom,Tcpreplay,7.8,HIGH,0.0017900000093504786,false,,false,false,false,,,false,false,,2022-03-26T00:00:00.000Z,0 CVE-2022-27939,https://securityvulnerability.io/vulnerability/CVE-2022-27939,Assertion Vulnerability in Tcpreplay Affects Multiple Versions,"An assertion vulnerability has been identified in Tcpreplay 4.4.1 specifically located in the function get_layer4_v6 within common/get.c. This flaw allows for potential unexpected behavior during the processing of network traffic, which may be exploited by an attacker to disrupt normal functions or manipulate the application's intended operations. Users of the affected version are advised to review their systems and apply the necessary patches to mitigate this risk.",Broadcom,Tcpreplay,5.5,MEDIUM,0.0017300000181421638,false,,false,false,false,,,false,false,,2022-03-26T00:00:00.000Z,0 CVE-2022-27942,https://securityvulnerability.io/vulnerability/CVE-2022-27942,Heap-based Buffer Over-read in Tcpreplay Affects Multiple Versions,"The Tcpreplay tool, specifically version 4.4.1, is susceptible to a heap-based buffer over-read identified in the parse_mpls function located in common/get.c. This vulnerability occurs when the application processes specific inputs, potentially leading to information disclosure or unexpected behavior. Users should ensure their installation of Tcpreplay is updated to the latest version to mitigate any risks associated with this flaw.",Broadcom,Tcpreplay,7.8,HIGH,0.0017900000093504786,false,,false,false,false,,,false,false,,2022-03-26T00:00:00.000Z,0 CVE-2022-27940,https://securityvulnerability.io/vulnerability/CVE-2022-27940,Heap-Based Buffer Over-Read in Tcpreplay by Appneta,The Tcpreplay version 4.4.1 contains a vulnerability characterized by a heap-based buffer over-read issue in the function get_ipv6_next found in common/get.c. This vulnerability could potentially expose sensitive information and compromise system integrity. It is essential for users of this software to be aware of this issue and apply recommended patches or updates to mitigate risk.,Broadcom,Tcpreplay,7.8,HIGH,0.0017900000093504786,false,,false,false,false,,,false,false,,2022-03-26T00:00:00.000Z,0 CVE-2022-25484,https://securityvulnerability.io/vulnerability/CVE-2022-25484,Reachable Assertion Vulnerability in tcpprep by AppNeta,"In tcpprep v4.4.1, a reachable assertion is present in the packet2tree() function located in tree.c. This vulnerability could lead to unintended behavior, potentially impacting the integrity of network packet processing. Users are recommended to review their usage of this software version and update accordingly to mitigate associated risks.",Broadcom,Tcpreplay,5.5,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-03-22T16:49:01.000Z,0 CVE-2021-45386,https://securityvulnerability.io/vulnerability/CVE-2021-45386,Reachable Assertion Vulnerability in tcpreplay by AppNeta,"A reachable assertion vulnerability exists in tcpreplay version 4.3.4 within the add_tree_ipv6() function of tree.c. This flaw can potentially be exploited by malicious actors to manipulate network traffic and execute arbitrary code, posing a significant risk to network security. It is crucial for users of the affected version to apply security patches and stay informed about mitigations.",Broadcom,Tcpreplay,5.5,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2022-02-11T00:00:00.000Z,0 CVE-2021-45387,https://securityvulnerability.io/vulnerability/CVE-2021-45387,Reachable Assertion Vulnerability in tcpreplay by AppNeta,"The tcpreplay version 4.3.4, developed by AppNeta, contains a reachable assertion vulnerability located within the add_tree_ipv4() function in the tree.c file. This flaw can potentially be exploited in specific configurations, leading to unexpected behaviors or a denial of service. Users are advised to review their implementations and ensure they are using patched versions to mitigate potential security risks.",Broadcom,Tcpreplay,5.5,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2022-02-11T00:00:00.000Z,0 CVE-2020-23273,https://securityvulnerability.io/vulnerability/CVE-2020-23273,Heap-buffer Overflow in Tcpreplay v4.3.2,"A heap-buffer overflow vulnerability exists in the randomize_iparp function of the Tcpreplay software (v4.3.2), which can be exploited by attackers to execute a denial of service attack by sending specially crafted pcap files. This flaw can lead to unexpected behavior, crashing of the application, and potential security risks, necessitating immediate attention from users and administrators.",Broadcom,Tcpreplay,5.5,MEDIUM,0.0007300000288523734,false,,false,false,false,,,false,false,,2021-09-22T00:15:00.000Z,0 CVE-2020-18976,https://securityvulnerability.io/vulnerability/CVE-2020-18976,Buffer Overflow Vulnerability in Tcpreplay by Appneta,"A buffer overflow flaw in Tcpreplay version 4.3.2 allows malicious actors to create a Denial of Service condition by exploiting the 'do_checksum' function within 'checksum.c'. This vulnerability is triggered when a specially crafted pcap file is sent to the 'tcpreplay-edit' binary, leading to potential disruptions in service functionality.",Broadcom,Tcpreplay,5.5,MEDIUM,0.0005099999834783375,false,,false,false,false,,,false,false,,2021-08-25T15:54:05.000Z,0 CVE-2020-24266,https://securityvulnerability.io/vulnerability/CVE-2020-24266,Heap Buffer Overflow in tcpreplay tcpprep Affects AppNeta,"A heap buffer overflow vulnerability was identified in the get_l2len() function of tcpreplay’s tcpprep tool, version 4.3.3. This flaw can cause the application to crash, resulting in a denial of service. Exploiting this vulnerability may lead to unintended application behavior and interruptions in service, raising significant concern for users relying on tcpreplay for network packet replay functionalities. It is crucial for affected parties to follow the security advisories from AppNeta and apply recommended updates to mitigate potential risks.",Broadcom,Tcpreplay,7.5,HIGH,0.0032599999103695154,false,,false,false,false,,,false,false,,2020-10-19T14:58:19.000Z,0 CVE-2020-24265,https://securityvulnerability.io/vulnerability/CVE-2020-24265,Heap Buffer Overflow in tcpreplay tcpprep Affects Appneta,"A heap buffer overflow issue in the MemcmpInterceptorCommon() function has been identified in tcpreplay tcpprep version 4.3.3. This vulnerability can lead to crashes of the tcpprep utility, which ultimately results in a denial of service, rendering the tool inoperative for users. Users are advised to apply available patches promptly to mitigate potential disruptions.",Broadcom,Tcpreplay,7.5,HIGH,0.0032599999103695154,false,,false,false,false,,,false,false,,2020-10-19T14:58:10.000Z,0 CVE-2020-12740,https://securityvulnerability.io/vulnerability/CVE-2020-12740,Heap-Based Buffer Over-Read in Tcpreplay by Appneta,"A vulnerability in Tcpreplay's tcprewrite component could lead to a heap-based buffer over-read. This occurs during a get_c operation, specifically in the get_ipv6_next() function found in common/get.c. Exploiting this flaw may allow an attacker to read sensitive memory content, which could lead to further compromise or information leakage.",Broadcom,Tcpreplay,9.1,CRITICAL,0.003590000094845891,false,,false,false,false,,,false,false,,2020-05-08T17:03:56.000Z,0