Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully handle an error when setting SNI for outbound TLS connection. The error can occur when Envoy attempts to use the `host`/`:authority` header value longer than 255 characters as SNI for outbound TLS connection. SNI length is limited to 255 characters per the standard. Envoy always expects this operation to succeed and abnormally aborts the process when it fails. This vulnerability is fixed in 1.30.1, 1.29.4, 1.28.3, and 1.27.5.
Max CVSS
7.5
EPSS Score
N/A
Published
2024-04-18
Updated
2024-04-18
Improper handling of values in HuginBase::PTools::Transform::transform of Hugin 2022.0.0 leads to an assertion failure.
Max CVSS
7.8
EPSS Score
0.05%
Published
2024-02-09
Updated
2024-02-20
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
Max CVSS
5.5
EPSS Score
0.05%
Published
2024-04-10
Updated
2024-04-10
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
8.6
EPSS Score
1.94%
Published
2023-12-04
Updated
2024-01-19
Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all users of affected versions of Vapor. The HTTP1 error handler closed connections when HTTP parse errors occur instead of passing them on. The issue is fixed as of Vapor release 4.84.2.
Max CVSS
5.3
EPSS Score
0.05%
Published
2023-10-05
Updated
2023-10-11
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Note: This issue is not noticed when all the devices in the network are Juniper devices. This issue affects Juniper Networks: Junos OS: * All versions prior to 20.4R3-S7; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S4; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3; * 22.3 versions prior to 22.3R3; * 22.4 versions prior to 22.4R3. Junos OS Evolved: * All versions prior to 22.3R3-EVO; * 22.4-EVO versions prior to 22.4R3-EVO; * 23.2-EVO versions prior to 23.2R1-EVO.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-10-12
Updated
2023-10-19
Transient DOS while processing 11AZ RTT management action frame received through OTA.
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-02-06
Updated
2024-04-12
The ACEManager component of ALEOS 4.16 and earlier does not perform input sanitization during authentication, which could potentially result in a Denial of Service (DoS) condition for ACEManager without impairing other router functions. ACEManager recovers from the DoS condition by restarting within ten seconds of becoming unavailable.
Max CVSS
7.5
EPSS Score
0.04%
Published
2023-12-04
Updated
2024-02-02
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.9.1 and 2.6.5, improper validation of sequence numbers may lead to remotely reachable assertion failure. This can remotely crash any Fast-DDS process. Versions 2.9.1 and 2.6.5 contain a patch for this issue.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-08-11
Updated
2023-08-21
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.10.0, 2.9.2, and 2.6.5, a malformed GAP submessage can trigger assertion failure, crashing FastDDS. Version 2.10.0, 2.9.2, and 2.6.5 contain a patch for this issue.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-08-11
Updated
2023-08-22
An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function.
Max CVSS
7.5
EPSS Score
0.08%
Published
2023-08-21
Updated
2023-08-29
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
libjpeg commit db33a6e was discovered to contain a reachable assertion via BitMapHook::BitMapHook at bitmaphook.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
Max CVSS
6.5
EPSS Score
0.05%
Published
2023-07-13
Updated
2023-07-27
A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and restart. Continued execution of this specific command will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS All versions prior to 19.3R3-S10; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2; 22.3 versions prior to 22.3R2; Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S7-EVO; 21.1 versions prior to 21.1R3-S3-EVO; 21.2 versions prior to 21.2R3-S5-EVO; 21.3 versions prior to 21.3R3-S4-EVO; 21.4 versions prior to 21.4R3-EVO; 22.1 versions prior to 22.1R3-EVO; 22.2 versions prior to 22.2R2-EVO; 22.3 versions prior to 22.3R2-EVO;
Max CVSS
5.5
EPSS Score
0.04%
Published
2023-07-14
Updated
2023-07-27
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-06-14
Updated
2023-06-23
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_property_hashmap_create at jerry-core/ecma/base/ecma-property-hashmap.c.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-06-14
Updated
2023-06-23
StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-12-13
Updated
2024-01-12
Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. A malformed proposed entry of the `intoto/v0.0.2` type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This has been fixed in v1.2.0 of Rekor. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
5.3
EPSS Score
0.05%
Published
2023-05-26
Updated
2023-06-05
Transient DOS while processing DL NAS Transport message, as specified in 3GPP 24.501 v16.
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-03-04
Updated
2024-04-12
Transient DOS while processing multiple payload container type with incorrect container length received in DL NAS transport OTA in NR.
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-03-04
Updated
2024-04-12
Transient DOS in Data modem while handling TLB control messages from the Network.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-12-05
Updated
2024-04-12
447 vulnerabilities found
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!