Digitalcorpora Tcpflow vulnerabilities
3 known vulnerabilities affecting digitalcorpora/tcpflow.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2026-25061MEDIUMCVSS 5.5≤ 1.6.12026-01-29
CVE-2026-25061 [MEDIUM] CWE-787 CVE-2026-25061: tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.
tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the like
nvdosv
CVE-2018-18409MEDIUMCVSS 5.5v1.5.02018-10-17
CVE-2018-18409 [MEDIUM] CWE-125 CVE-2018-18409: A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received inco
A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an address_histogram call or a get_histogram call.
nvdosv
CVE-2018-14938CRITICALCVSS 9.1≤ 1.4.5v1.5.02018-08-05
CVE-2018-14938 [CRITICAL] CWE-125 CVE-2018-14938: An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer
An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or
nvdosv