Show filters
250 Total Results
Displaying 81-90 of 250
Sort by:
Attacker Value
Unknown
CVE-2022-25484
Disclosure Date: March 22, 2022 (last updated February 23, 2025)
tcpprep v4.4.1 has a reachable assertion (assert(l2len > 0)) in packet2tree() at tree.c in tcpprep v4.4.1.
0
Attacker Value
Unknown
CVE-2022-0667
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
0
Attacker Value
Unknown
CVE-2022-0635
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
0
Attacker Value
Unknown
CVE-2022-0865
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
0
Attacker Value
Unknown
CVE-2021-45861
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
There is an Assertion `num <= INT_BIT' failed at BitStreamReader::skipBits in /bitStream.h:132 of tsMuxer git-c6a0277.
0
Attacker Value
Unknown
CVE-2022-22901
Disclosure Date: February 17, 2022 (last updated February 23, 2025)
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at parser_parse_function_arguments in /js/js-parser.c of JerryScript commit a6ab5e9.
0
Attacker Value
Unknown
CVE-2021-45387
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv4() at tree.c.
0
Attacker Value
Unknown
CVE-2021-45386
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c
0
Attacker Value
Unknown
CVE-2021-30326
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Possible assertion due to improper size validation while processing the DownlinkPreemption IE in an RRC Reconfiguration/RRC Setup message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
0
Attacker Value
Unknown
CVE-2022-23588
Disclosure Date: February 04, 2022 (last updated February 23, 2025)
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
0