Total
528 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-28425 | 1 Redis | 1 Redis | 2024-11-21 | N/A | 5.5 MEDIUM |
Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10. | |||||
CVE-2023-24843 | 1 Qualcomm | 132 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 129 more | 2024-11-21 | N/A | 7.5 HIGH |
Transient DOS in Modem while triggering a camping on an 5G cell. | |||||
CVE-2023-21653 | 1 Qualcomm | 20 Ar8035, Ar8035 Firmware, Qca8081 and 17 more | 2024-11-21 | N/A | 7.5 HIGH |
Transient DOS in Modem while processing RRC reconfiguration message. | |||||
CVE-2023-21646 | 1 Qualcomm | 108 Ar8035, Ar8035 Firmware, Qca6390 and 105 more | 2024-11-21 | N/A | 7.5 HIGH |
Transient DOS in Modem while processing invalid System Information Block 1. | |||||
CVE-2023-1428 | 1 Grpc | 1 Grpc | 2024-11-21 | N/A | 7.5 HIGH |
There exists an vulnerability causing an abort() to be called in gRPC. The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above. | |||||
CVE-2022-41901 | 1 Google | 1 Tensorflow | 2024-11-21 | N/A | 4.8 MEDIUM |
TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. | |||||
CVE-2022-41899 | 1 Google | 1 Tensorflow | 2024-11-21 | N/A | 4.8 MEDIUM |
TensorFlow is an open source platform for machine learning. Inputs `dense_features` or `example_state_data` not of rank 2 will trigger a `CHECK` fail in `SdcaOptimizer`. We have patched the issue in GitHub commit 80ff197d03db2a70c6a111f97dcdacad1b0babfa. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. | |||||
CVE-2022-41893 | 1 Google | 1 Tensorflow | 2024-11-21 | N/A | 4.8 MEDIUM |
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. | |||||
CVE-2022-40755 | 1 Jasper Project | 1 Jasper | 2024-11-21 | N/A | 5.5 MEDIUM |
JasPer 3.0.6 allows denial of service via a reachable assertion in the function inttobits in libjasper/base/jas_image.c. | |||||
CVE-2022-40538 | 1 Qualcomm | 26 Ar8035, Ar8035 Firmware, Qca8081 and 23 more | 2024-11-21 | N/A | 7.5 HIGH |
Transient DOS due to reachable assertion in modem while processing sib with incorrect values from network. | |||||
CVE-2022-40527 | 1 Qualcomm | 198 Ar8035, Ar8035 Firmware, Csr8811 and 195 more | 2024-11-21 | N/A | 7.5 HIGH |
Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. | |||||
CVE-2022-40508 | 1 Qualcomm | 136 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 133 more | 2024-11-21 | N/A | 7.5 HIGH |
Transient DOS due to reachable assertion in Modem while processing config related to cross carrier scheduling, which is not supported. | |||||
CVE-2022-40504 | 1 Qualcomm | 378 315 5g Iot Modem, 315 5g Iot Modem Firmware, 8905 and 375 more | 2024-11-21 | N/A | 7.5 HIGH |
Transient DOS due to reachable assertion in Modem when UE received Downlink Data Indication message from the network. | |||||
CVE-2022-38496 | 1 Lief-project | 1 Lief | 2024-11-21 | N/A | 5.5 MEDIUM |
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the component BinaryStream.hpp. | |||||
CVE-2022-38349 | 1 Freedesktop | 1 Poppler | 2024-11-21 | N/A | 6.5 MEDIUM |
An issue was discovered in Poppler 22.08.0. There is a reachable assertion in Object.h, will lead to denial of service because PDFDoc::replacePageDict in PDFDoc.cc lacks a stream check before saving an embedded file. | |||||
CVE-2022-37052 | 1 Freedesktop | 1 Poppler | 2024-11-21 | N/A | 6.5 MEDIUM |
A reachable Object::getString assertion in Poppler 22.07.0 allows attackers to cause a denial of service due to a failure in markObject. | |||||
CVE-2022-37051 | 2 Debian, Freedesktop | 2 Debian Linux, Poppler | 2024-11-21 | N/A | 6.5 MEDIUM |
An issue was discovered in Poppler 22.07.0. There is a reachable abort which leads to denial of service because the main function in pdfunite.cc lacks a stream check before saving an embedded file. | |||||
CVE-2022-36522 | 1 Mikrotik | 1 Routeros | 2024-11-21 | N/A | 6.5 MEDIUM |
Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. | |||||
CVE-2022-36440 | 3 Debian, Fedoraproject, Frrouting | 3 Debian Linux, Fedora, Frrouting | 2024-11-21 | N/A | 7.5 HIGH |
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS. | |||||
CVE-2022-36026 | 1 Google | 1 Tensorflow | 2024-11-21 | N/A | 5.9 MEDIUM |
TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. |