Vulnerabilities (CVE)

Filtered by CWE-617
Total 519 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-37836 1 Jpeg 1 Libjpeg 2024-11-21 N/A 6.5 MEDIUM
libjpeg commit db33a6e was discovered to contain a reachable assertion via BitMapHook::BitMapHook at bitmaphook.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
CVE-2023-36840 1 Juniper 2 Junos, Junos Os Evolved 2024-11-21 N/A 5.5 MEDIUM
A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and restart. Continued execution of this specific command will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS All versions prior to 19.3R3-S10; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2; 22.3 versions prior to 22.3R2; Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S7-EVO; 21.1 versions prior to 21.1R3-S3-EVO; 21.2 versions prior to 21.2R3-S5-EVO; 21.3 versions prior to 21.3R3-S4-EVO; 21.4 versions prior to 21.4R3-EVO; 22.1 versions prior to 22.1R3-EVO; 22.2 versions prior to 22.2R2-EVO; 22.3 versions prior to 22.3R2-EVO;
CVE-2023-34194 1 Tinyxml Project 1 Tinyxml 2024-11-21 N/A 7.5 HIGH
StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace.
CVE-2023-33199 1 Linuxfoundation 1 Rekor 2024-11-21 N/A 5.3 MEDIUM
Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. A malformed proposed entry of the `intoto/v0.0.2` type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This has been fixed in v1.2.0 of Rekor. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-33044 1 Qualcomm 180 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 177 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Data modem while handling TLB control messages from the Network.
CVE-2023-33043 1 Qualcomm 118 Ar8035, Ar8035 Firmware, Qca6391 and 115 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Modem when a Beam switch request is made with a non-configured BWP.
CVE-2023-33041 1 Qualcomm 254 Ar8035, Ar8035 Firmware, Csr8811 and 251 more 2024-11-21 N/A 7.5 HIGH
Under certain scenarios the WLAN Firmware will reach an assertion due to state confusion while looking up peer ids.
CVE-2023-32846 1 Mediatek 36 Mt2735, Mt2737, Mt6297 and 33 more 2024-11-21 N/A 7.5 HIGH
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861).
CVE-2023-32845 1 Mediatek 36 Mt2735, Mt2737, Mt6297 and 33 more 2024-11-21 N/A 7.5 HIGH
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860).
CVE-2023-32844 1 Mediatek 36 Mt2735, Mt2737, Mt6297 and 33 more 2024-11-21 N/A 7.5 HIGH
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850).
CVE-2023-32843 1 Mediatek 36 Mt2735, Mt2737, Mt6297 and 33 more 2024-11-21 N/A 7.5 HIGH
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849).
CVE-2023-32842 1 Mediatek 36 Mt2735, Mt2737, Mt6297 and 33 more 2024-11-21 N/A 7.5 HIGH
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848).
CVE-2023-32841 1 Mediatek 36 Mt2735, Mt2737, Mt6297 and 33 more 2024-11-21 N/A 7.5 HIGH
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846).
CVE-2023-32820 4 Google, Linux, Linuxfoundation and 1 more 43 Android, Linux Kernel, Yocto and 40 more 2024-11-21 N/A 7.5 HIGH
In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.
CVE-2023-2156 4 Debian, Fedoraproject, Linux and 1 more 4 Debian Linux, Fedora, Linux Kernel and 1 more 2024-11-21 N/A 7.5 HIGH
A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
CVE-2023-28856 3 Debian, Fedoraproject, Redis 3 Debian Linux, Fedora, Redis 2024-11-21 N/A 5.5 MEDIUM
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-24843 1 Qualcomm 132 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 129 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Modem while triggering a camping on an 5G cell.
CVE-2023-21653 1 Qualcomm 20 Ar8035, Ar8035 Firmware, Qca8081 and 17 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Modem while processing RRC reconfiguration message.
CVE-2023-21646 1 Qualcomm 108 Ar8035, Ar8035 Firmware, Qca6390 and 105 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Modem while processing invalid System Information Block 1.
CVE-2023-1428 1 Grpc 1 Grpc 2024-11-21 N/A 7.5 HIGH
There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.