Vulnerabilities (CVE)

Filtered by CWE-617
Total 528 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-28425 1 Redis 1 Redis 2024-11-21 N/A 5.5 MEDIUM
Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.
CVE-2023-24843 1 Qualcomm 132 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 129 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Modem while triggering a camping on an 5G cell.
CVE-2023-21653 1 Qualcomm 20 Ar8035, Ar8035 Firmware, Qca8081 and 17 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Modem while processing RRC reconfiguration message.
CVE-2023-21646 1 Qualcomm 108 Ar8035, Ar8035 Firmware, Qca6390 and 105 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in Modem while processing invalid System Information Block 1.
CVE-2023-1428 1 Grpc 1 Grpc 2024-11-21 N/A 7.5 HIGH
There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.
CVE-2022-41901 1 Google 1 Tensorflow 2024-11-21 N/A 4.8 MEDIUM
TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
CVE-2022-41899 1 Google 1 Tensorflow 2024-11-21 N/A 4.8 MEDIUM
TensorFlow is an open source platform for machine learning. Inputs `dense_features` or `example_state_data` not of rank 2 will trigger a `CHECK` fail in `SdcaOptimizer`. We have patched the issue in GitHub commit 80ff197d03db2a70c6a111f97dcdacad1b0babfa. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
CVE-2022-41893 1 Google 1 Tensorflow 2024-11-21 N/A 4.8 MEDIUM
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
CVE-2022-40755 1 Jasper Project 1 Jasper 2024-11-21 N/A 5.5 MEDIUM
JasPer 3.0.6 allows denial of service via a reachable assertion in the function inttobits in libjasper/base/jas_image.c.
CVE-2022-40538 1 Qualcomm 26 Ar8035, Ar8035 Firmware, Qca8081 and 23 more 2024-11-21 N/A 7.5 HIGH
Transient DOS due to reachable assertion in modem while processing sib with incorrect values from network.
CVE-2022-40527 1 Qualcomm 198 Ar8035, Ar8035 Firmware, Csr8811 and 195 more 2024-11-21 N/A 7.5 HIGH
Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM.
CVE-2022-40508 1 Qualcomm 136 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 133 more 2024-11-21 N/A 7.5 HIGH
Transient DOS due to reachable assertion in Modem while processing config related to cross carrier scheduling, which is not supported.
CVE-2022-40504 1 Qualcomm 378 315 5g Iot Modem, 315 5g Iot Modem Firmware, 8905 and 375 more 2024-11-21 N/A 7.5 HIGH
Transient DOS due to reachable assertion in Modem when UE received Downlink Data Indication message from the network.
CVE-2022-38496 1 Lief-project 1 Lief 2024-11-21 N/A 5.5 MEDIUM
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the component BinaryStream.hpp.
CVE-2022-38349 1 Freedesktop 1 Poppler 2024-11-21 N/A 6.5 MEDIUM
An issue was discovered in Poppler 22.08.0. There is a reachable assertion in Object.h, will lead to denial of service because PDFDoc::replacePageDict in PDFDoc.cc lacks a stream check before saving an embedded file.
CVE-2022-37052 1 Freedesktop 1 Poppler 2024-11-21 N/A 6.5 MEDIUM
A reachable Object::getString assertion in Poppler 22.07.0 allows attackers to cause a denial of service due to a failure in markObject.
CVE-2022-37051 2 Debian, Freedesktop 2 Debian Linux, Poppler 2024-11-21 N/A 6.5 MEDIUM
An issue was discovered in Poppler 22.07.0. There is a reachable abort which leads to denial of service because the main function in pdfunite.cc lacks a stream check before saving an embedded file.
CVE-2022-36522 1 Mikrotik 1 Routeros 2024-11-21 N/A 6.5 MEDIUM
Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
CVE-2022-36440 3 Debian, Fedoraproject, Frrouting 3 Debian Linux, Fedora, Frrouting 2024-11-21 N/A 7.5 HIGH
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS.
CVE-2022-36026 1 Google 1 Tensorflow 2024-11-21 N/A 5.9 MEDIUM
TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.