A vulnerability classified as critical was found in tcpdump up to 4.9.1. Affected by this issue is the function l_strnstart of the file print-beep.c of the component BEEP Parser. Executing manipulation can lead to memory corruption.
The identification of this vulnerability is CVE-2017-13010. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in Apple macOS up to 10.13.1. Affected is an unknown function of the component tcpdump. The manipulation results in memory corruption.
This vulnerability is known as CVE-2017-13010. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in tcpdump up to 4.9.1 and classified as critical. This issue affects some unknown processing of the file print-arp.c of the component ARP Parser. This manipulation causes memory corruption.
This vulnerability is tracked as CVE-2017-13013. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Apple macOS up to 10.13.1. It has been classified as critical. This affects an unknown part of the component tcpdump. Performing manipulation results in memory corruption.
This vulnerability was named CVE-2017-13013. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in tcpdump up to 4.9.1 and classified as critical. Impacted is the function wb_prep of the file print-wb.c of the component White Board Parser. Such manipulation leads to memory corruption.
This vulnerability is listed as CVE-2017-13014. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Apple macOS up to 10.13.1. It has been declared as critical. This vulnerability affects unknown code of the component tcpdump. Executing manipulation can lead to memory corruption.
The identification of this vulnerability is CVE-2017-13014. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in tcpdump up to 4.9.1. It has been classified as critical. The affected element is the function eap_print of the file print-eap.c of the component EAP Parser. Performing manipulation results in memory corruption.
This vulnerability is cataloged as CVE-2017-13015. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Apple macOS up to 10.13.1. It has been rated as critical. This issue affects some unknown processing of the component tcpdump. The manipulation leads to memory corruption.
This vulnerability is referenced as CVE-2017-13015. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in tcpdump up to 4.9.1. This affects an unknown function of the file print-l2tp.c of the component L2TP Parser. The manipulation results in memory corruption.
This vulnerability is known as CVE-2017-13006. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Apple macOS up to 10.13.1. The affected element is an unknown function of the component tcpdump. Such manipulation leads to memory corruption.
This vulnerability is documented as CVE-2017-13006. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Apple macOS up to 10.13.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component tcpdump. Performing manipulation results in memory corruption.
This vulnerability is identified as CVE-2017-13001. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in tcpdump up to 4.9.1. It has been declared as critical. This issue affects the function aodv_extension of the file print-aodv.c of the component AODV Parser. Such manipulation leads to memory corruption.
This vulnerability is documented as CVE-2017-13002. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Apple macOS up to 10.13.1. This affects an unknown part of the component tcpdump. Executing manipulation can lead to memory corruption.
This vulnerability is tracked as CVE-2017-13002. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
CVE-2025-55182 is a critical (CVSS 10.0) pre-authentication remote code execution vulnerability affecting React Server Components used in React.js, Next.js, and related frameworks (see the context section for a more exhaustive list of affected frameworks).
GreyNoise is already seeing opportunistic, largely automated exploitation attempts consistent with the newly disclosed React Server Components (RSC) “Flight” protocol RCE—often referred to publicly as “React2Shell” and tracked as CVE-2025-55182.
Cloudflare experienced a significant traffic outage on December 5, 2025, starting approximately at 8:47 UTC. The incident lasted approximately 25 minutes before resolution. We are sorry for the impact that it caused to our customers and the Internet. The incident was not caused by an attack and was due to configuration changes being applied to attempt to mitigate a recent industry-wide vulnerability impacting React Server Components.