https://whilenetworking.com/2018/07/11/succession-tcpip-vulnerabilities/
Succession TCP/IP Vulnerabilities