Appneta Tcpreplay vulnerabilities
6 known vulnerabilities affecting appneta/tcpreplay.
Total CVEs
6
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2025-9649MEDIUMCVSS 4.8v4.5.12025-08-29
CVE-2025-9649 [MEDIUM] CWE-369 CVE-2025-9649: A security vulnerability has been detected in appneta tcpreplay 4.5.1. Impacted is the function calc
A security vulnerability has been detected in appneta tcpreplay 4.5.1. Impacted is the function calc_sleep_time of the file send_packets.c. Such manipulation leads to divide by zero. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. Upgrading to version 4.5.3-beta3 is recommended to address this issue. It
cvelistv5nvd
CVE-2025-9385MEDIUMCVSS 4.8v4.5.0v4.5.12025-08-24
CVE-2025-9385 [MEDIUM] CWE-119 CVE-2025-9385: A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv
A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restricted to local execution. The exploit has been published and may be used. Upgrading to version 4.5.2-beta3 is sufficient to fi
cvelistv5nvd
CVE-2025-9384MEDIUMCVSS 4.8v4.5.0v4.5.12025-08-24
CVE-2025-9384 [MEDIUM] CWE-404 CVE-2025-9384: A vulnerability was detected in appneta tcpreplay up to 4.5.1. Impacted is the function tcpedit_post
A vulnerability was detected in appneta tcpreplay up to 4.5.1. Impacted is the function tcpedit_post_args of the file /src/tcpedit/parse_args.c. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 4.5.2-beta2 is recommended to address this
cvelistv5nvd
CVE-2025-9386MEDIUMCVSS 4.8v4.5.0v4.5.12025-08-24
CVE-2025-9386 [MEDIUM] CWE-119 CVE-2025-9386: A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the functio
A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.2-beta3 is suff
cvelistv5nvd
CVE-2025-9157MEDIUMCVSS 4.8v4.5.2-beta1v4.5.2-beta22025-08-19
CVE-2025-9157 [MEDIUM] CWE-119 CVE-2025-9157: A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the f
A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utiliz
cvelistv5nvd
CVE-2024-3024HIGHCVSS 7.8v4.4.0v4.4.1+3 more2024-03-28
CVE-2024-3024 [MEDIUM] CWE-122 CVE-2024-3024: A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. T
A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. This affects the function get_layer4_v6 of the file /tcpreplay/src/common/get.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-25
cvelistv5nvd