CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

f5

traffix_signaling_delivery_controller

28 known vulnerabilities · sorted by CVSS score

CVE-2018-20836
HIGH8.1

An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.

linux / linux_kernel+21
Network
Published May 7, 2019
Page 1 of 2
CVE-2019-9077
HIGH7.8

An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.

gnu / binutils+3
Local
Published Feb 24, 2019
CVE-2018-14634
HIGH7.8

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

paloaltonetworks / pan-os+96
Local
Published Sep 25, 2018
CVE-2019-9070
HIGH7.8

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls.

gnu / binutils+4
Local
Published Feb 24, 2019
CVE-2019-5436
HIGH7.8

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

haxx / libcurl+15
Local
Published May 28, 2019
CVE-2018-14880
HIGH7.5

The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().

tcpdump / tcpdump+82
Network
Published Oct 3, 2019
CVE-2019-13050
HIGH7.5

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

gnupg / gnupg+6
Network
Published Jun 29, 2019
CVE-2019-13565
HIGH7.5

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.

openldap / openldap+28
Network
Published Jul 26, 2019
CVE-2018-14468
HIGH7.5

The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().

tcpdump / tcpdump+82
Network
Published Oct 3, 2019
CVE-2019-11477
HIGH7.5

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

linux / linux_kernel+90
Network
Published Jun 19, 2019
CVE-2002-20001
HIGH7.5

The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.

balasys / dheater+63
Network
Published Nov 11, 2021
CVE-2019-11479
HIGH7.5

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

linux / linux_kernel+94
Network
Published Jun 19, 2019
CVE-2019-16714
HIGH7.5

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

linux / linux_kernel+3
Network
Published Sep 23, 2019
CVE-2018-14462
HIGH7.5

The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().

tcpdump / tcpdump+13
Network
Published Oct 3, 2019
CVE-2018-16229
HIGH7.5

The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().

tcpdump / tcpdump+13
Network
Published Oct 3, 2019
CVE-2018-20657
HIGH7.5

The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698.

gnu / binutils+2
Network
Published Jan 2, 2019
CVE-2018-14882
HIGH7.5

The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.

tcpdump / tcpdump+13
Network
Published Oct 3, 2019
CVE-2018-1320
HIGH7.5

Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.

apache / thrift+6
Network
Published Jan 7, 2019
CVE-2018-14469
HIGH7.5

The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().

fedoraproject / fedora+13
Network
Published Oct 3, 2019
CVE-2018-14465
HIGH7.5

The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().

tcpdump / tcpdump+13
Network
Published Oct 3, 2019