A vulnerability, which was classified as problematic, has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free.
This vulnerability is tracked as CVE-2025-9385. The attack is restricted to local execution. Moreover, an exploit is present.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free.
This vulnerability is listed as CVE-2025-9386. The attack must be carried out locally. In addition, an exploit is available.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.8. This affects the function real_mode_header of the component acpi. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2023-52994. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability has been found in Linux Kernel up to 6.1.8 and classified as critical. Affected is the function get_irq_regs of the component i8259. Performing manipulation results in null pointer dereference.
This vulnerability was named CVE-2023-52993. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.1.9. Impacted is the function absolute_pointer of the file arch/s390/kernel/setup.c. Executing manipulation can lead to out-of-bounds read.
This vulnerability appears as CVE-2023-52990. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.10.166/5.15.91/6.1.9. It has been declared as critical. This affects the function skb_segment_list of the component net. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2023-52991. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.4.230/5.10.166/5.15.91/6.1.9. The affected element is the function send_signal_common of the component bpf. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2023-52992. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.10. This issue affects the function release_request of the file drivers/firewire/core-cdev.c of the component FCP Handler. This manipulation causes use after free.
This vulnerability appears as CVE-2023-52989. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
Currently trending CVE - Hype Score: 3 - Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
A vulnerability was found in Oracle Java SE 20.3.13/21.3.9. It has been classified as critical. This vulnerability affects unknown code of the component JavaFX. The manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2024-21005. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in liblnk up to 2018-04-19. Affected is the function liblnk_location_information_read_data of the file liblnk_location_information.c of the component lnk File Handler. The manipulation results in out-of-bounds read.
This vulnerability is reported as CVE-2018-12097. The attack can be launched remotely. No exploit exists.
There is ongoing doubt regarding the real existence of this vulnerability.