Filtered by CWE-476
Total 3979 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-36602 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-01-01 7.5 High
Windows TCP/IP Denial of Service Vulnerability
CVE-2023-36603 1 Microsoft 7 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 4 more 2025-01-01 7.5 High
Windows TCP/IP Denial of Service Vulnerability
CVE-2023-32084 1 Microsoft 5 Windows 10 1809, Windows 11 21h2, Windows 11 22h2 and 2 more 2025-01-01 7.5 High
HTTP.sys Denial of Service Vulnerability
CVE-2023-35338 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-01-01 7.5 High
Windows Peer Name Resolution Protocol Denial of Service Vulnerability
CVE-2023-32008 1 Microsoft 10 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 7 more 2025-01-01 7.8 High
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVE-2023-24938 1 Microsoft 7 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 4 more 2025-01-01 6.5 Medium
Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-24910 1 Microsoft 15 365, Office, Office Long Term Servicing Channel and 12 more 2025-01-01 7.8 High
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-24859 1 Microsoft 12 Windows 10, Windows 10 1607, Windows 10 1809 and 9 more 2025-01-01 7.5 High
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
CVE-2023-21700 1 Microsoft 13 Windows 10, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-01 7.5 High
Windows iSCSI Discovery Service Denial of Service Vulnerability
CVE-2023-21758 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-01-01 7.5 High
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
CVE-2023-21757 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-01-01 7.5 High
Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability
CVE-2023-21683 1 Microsoft 13 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 10 more 2025-01-01 7.5 High
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
CVE-2023-21547 1 Microsoft 9 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 6 more 2025-01-01 7.5 High
Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
CVE-2024-38233 1 Microsoft 2 Windows 10 1607, Windows Server 2016 2024-12-31 7.5 High
Windows Networking Denial of Service Vulnerability
CVE-2024-38232 1 Microsoft 2 Windows 10 1607, Windows Server 2016 2024-12-31 7.5 High
Windows Networking Denial of Service Vulnerability
CVE-2024-53580 1 Redhat 6 Enterprise Linux, Rhel Aus, Rhel E4s and 3 more 2024-12-31 7.5 High
iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function.
CVE-2023-52833 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2024-12-31 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: Add date->evt_skb is NULL check fix crash because of null pointers [ 6104.969662] BUG: kernel NULL pointer dereference, address: 00000000000000c8 [ 6104.969667] #PF: supervisor read access in kernel mode [ 6104.969668] #PF: error_code(0x0000) - not-present page [ 6104.969670] PGD 0 P4D 0 [ 6104.969673] Oops: 0000 [#1] SMP NOPTI [ 6104.969684] RIP: 0010:btusb_mtk_hci_wmt_sync+0x144/0x220 [btusb] [ 6104.969688] RSP: 0018:ffffb8d681533d48 EFLAGS: 00010246 [ 6104.969689] RAX: 0000000000000000 RBX: ffff8ad560bb2000 RCX: 0000000000000006 [ 6104.969691] RDX: 0000000000000000 RSI: ffffb8d681533d08 RDI: 0000000000000000 [ 6104.969692] RBP: ffffb8d681533d70 R08: 0000000000000001 R09: 0000000000000001 [ 6104.969694] R10: 0000000000000001 R11: 00000000fa83b2da R12: ffff8ad461d1d7c0 [ 6104.969695] R13: 0000000000000000 R14: ffff8ad459618c18 R15: ffffb8d681533d90 [ 6104.969697] FS: 00007f5a1cab9d40(0000) GS:ffff8ad578200000(0000) knlGS:00000 [ 6104.969699] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 6104.969700] CR2: 00000000000000c8 CR3: 000000018620c001 CR4: 0000000000760ef0 [ 6104.969701] PKRU: 55555554 [ 6104.969702] Call Trace: [ 6104.969708] btusb_mtk_shutdown+0x44/0x80 [btusb] [ 6104.969732] hci_dev_do_close+0x470/0x5c0 [bluetooth] [ 6104.969748] hci_rfkill_set_block+0x56/0xa0 [bluetooth] [ 6104.969753] rfkill_set_block+0x92/0x160 [ 6104.969755] rfkill_fop_write+0x136/0x1e0 [ 6104.969759] __vfs_write+0x18/0x40 [ 6104.969761] vfs_write+0xdf/0x1c0 [ 6104.969763] ksys_write+0xb1/0xe0 [ 6104.969765] __x64_sys_write+0x1a/0x20 [ 6104.969769] do_syscall_64+0x51/0x180 [ 6104.969771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 6104.969773] RIP: 0033:0x7f5a21f18fef [ 6104.9] RSP: 002b:00007ffeefe39010 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 6104.969780] RAX: ffffffffffffffda RBX: 000055c10a7560a0 RCX: 00007f5a21f18fef [ 6104.969781] RDX: 0000000000000008 RSI: 00007ffeefe39060 RDI: 0000000000000012 [ 6104.969782] RBP: 00007ffeefe39060 R08: 0000000000000000 R09: 0000000000000017 [ 6104.969784] R10: 00007ffeefe38d97 R11: 0000000000000293 R12: 0000000000000002 [ 6104.969785] R13: 00007ffeefe39220 R14: 00007ffeefe391a0 R15: 000055c10a72acf0
CVE-2022-48710 1 Linux 1 Linux Kernel 2024-12-31 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix a possible null pointer dereference In radeon_fp_native_mode(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd. The failure status of drm_cvt_mode() on the other path is checked too.
CVE-2022-48708 1 Linux 1 Linux Kernel 2024-12-31 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: pinctrl: single: fix potential NULL dereference Added checking of pointer "function" in pcs_set_mux(). pinmux_generic_get_function() can return NULL and the pointer "function" was dereferenced without checking against NULL. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2022-48707 1 Linux 1 Linux Kernel 2024-12-31 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: cxl/region: Fix null pointer dereference for resetting decoder Not all decoders have a reset callback. The CXL specification allows a host bridge with a single root port to have no explicit HDM decoders. Currently the region driver assumes there are none. As such the CXL core creates a special pass through decoder instance without a commit/reset callback. Prior to this patch, the ->reset() callback was called unconditionally when calling cxl_region_decode_reset. Thus a configuration with 1 Host Bridge, 1 Root Port, and one directly attached CXL type 3 device or multiple CXL type 3 devices attached to downstream ports of a switch can cause a null pointer dereference. Before the fix, a kernel crash was observed when we destroy the region, and a pass through decoder is reset. The issue can be reproduced as below, 1) create a region with a CXL setup which includes a HB with a single root port under which a memdev is attached directly. 2) destroy the region with cxl destroy-region regionX -f.