Filtered by CWE-476
Total 4263 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-9484 2 Avast, Avg 2 Antivirus, Antivirus 2024-11-08 5.1 Medium
An null-pointer-derefrence in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed xar file to crash the application during file processing.
CVE-2024-9483 2 Avast, Avg 2 Antivirus, Antivirus 2024-11-08 5.1 Medium
A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing.
CVE-2024-10750 1 Tenda 2 I22, I22 Firmware 2024-11-07 6.5 Medium
A vulnerability has been found in Tenda i22 1.0.0.3(4687) and classified as problematic. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV?fgHPOST/goform/SysToo. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-22733 1 Tp-link 3 Mr200, Mr200 Firmware, Tl-mr200 V4 Firmware 2024-11-05 3.5 Low
TP Link MR200 V4 Firmware version 210201 was discovered to contain a null-pointer-dereference in the web administration panel on /cgi/login via the sign, Action or LoginStatus query parameters which could lead to a denial of service by a local or remote unauthenticated attacker.
CVE-2024-20426 1 Cisco 2 Adaptive Security Appliance Software, Firepower Threat Defense Software 2024-11-05 8.6 High
A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol for VPN termination of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
CVE-2024-10280 1 Tenda 20 Ac10, Ac10 Firmware, Ac10u and 17 more 2024-11-01 6.5 Medium
A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2022-3857 2024-10-29 5.5 Medium
Maintainer contacted. This is a false-positive. The flaw does not actually exist and was erroneously tested.
CVE-2024-44101 1 Google 1 Android 2024-10-28 7.5 High
there is a possible Null Pointer Dereference (modem crash) due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-40493 2 Keith-cullen, Keithcullen 2 Freecoap, Freecoap 2024-10-25 5.3 Medium
Null Pointer Dereference in `coap_client_exchange_blockwise2` function in Keith Cullen FreeCoAP 1.0 allows remote attackers to cause a denial of service and potentially execute arbitrary code via a specially crafted CoAP packet that causes `coap_msg_get_payload(resp)` to return a null pointer, which is then dereferenced in a call to `memcpy`.
CVE-2024-47459 1 Adobe 1 Substance 3d Sampler 2024-10-23 5.5 Medium
Substance3D - Sampler versions 4.5 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS) condition. An attacker could exploit this vulnerability to crash the application, resulting in a DoS. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-39440 2 Google, Unisoc 10 Android, S8000, T606 and 7 more 2024-10-17 6.2 Medium
In DRM service, there is a possible system crash due to null pointer dereference. This could lead to local denial of service with System execution privileges needed.
CVE-2024-47007 1 Ivanti 1 Avalanche 2024-10-16 7.5 High
A NULL pointer dereference in WLAvalancheService.exe of Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to cause a denial of service.
CVE-2024-35215 2024-10-10 6.2 Medium
NULL pointer dereference in IP socket options processing of the Networking Stack in QNX Software Development Platform (SDP) version(s) 7.1 and 7.0 could allow an attacker with local access to cause a denial-of-service condition in the context of the Networking Stack process.
CVE-2024-20436 1 Cisco 1 Ios Xe 2024-10-08 8.6 High
A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device.
CVE-2024-8454 2 Planet, Planet Technology Corp 7 Gs-4210-24p2s, Gs-4210-24p2s Firmware, Gs-4210-24pl4c and 4 more 2024-10-04 5.3 Medium
The swctrl service is used to detect and remotely manage PLANET Technology devices. Certain switch models have a Denial-of-Service vulnerability in the swctrl service, allowing unauthenticated remote attackers to send crafted packets that can crash the service.
CVE-2021-47220 2024-10-03 4.4 Medium
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-47290 1 Huawei 2 Emui, Harmonyos 2024-10-01 5.5 Medium
Input validation vulnerability in the USB service module Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2024-45809 1 Envoyproxy 1 Envoy 2024-09-24 5.3 Medium
Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy crash when clear route cache with remote JWKs. In the following case: 1. remote JWKs are used, which requires async header processing; 2. clear_route_cache is enabled on the provider; 3. header operations are enabled in JWT filter, e.g. header to claims feature; 4. the routing table is configured in a way that the JWT header operations modify requests to not match any route. When these conditions are met, a crash is triggered in the upstream code due to nullptr reference conversion from route(). The root cause is the ordering of continueDecoding and clearRouteCache. This issue has been addressed in versions 1.31.2, 1.30.6, and 1.29.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-32666 1 Intel 1 Raid Web Console 2024-09-23 4.7 Medium
NULL pointer dereference in Intel(R) RAID Web Console software for all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2024-23915 2 Open Networking Foundation, Opennetworking 2 Libfluid, Libfluid Msg 2024-09-20 5.3 Medium
Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routines fluid_msg::of13::InstructionSet::unpack. This issue affects libfluid: 0.1.0.