Filtered by CWE-617
Total 556 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-46350 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.
CVE-2021-46345 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerry-core/lit/lit-strings.c in JerryScript 3.0.0.
CVE-2021-46344 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'flags & PARSER_PATTERN_HAS_REST_ELEMENT' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
CVE-2021-46347 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
CVE-2021-46346 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
CVE-2021-46343 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
CVE-2021-46340 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'context_p->stack_top_uint8 == SCAN_STACK_TRY_STATEMENT || context_p->stack_top_uint8 == SCAN_STACK_CATCH_STATEMENT' failed at /parser/js/js-scanner.c(scanner_scan_statement_end) in JerryScript 3.0.0.
CVE-2021-46336 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'opts & PARSER_CLASS_LITERAL_CTOR_PRESENT' failed at /parser/js/js-parser-expr.c(parser_parse_class_body) in JerryScript 3.0.0.
CVE-2021-46337 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion 'page_p != NULL' failed at /parser/js/js-parser-mem.c(parser_list_get) in JerryScript 3.0.0.
CVE-2021-46054 1 Webassembly 1 Binaryen 2024-08-04 5.5 Medium
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).
CVE-2021-46055 1 Webassembly 1 Binaryen 2024-08-04 5.5 Medium
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).
CVE-2021-46052 1 Webassembly 1 Binaryen 2024-08-04 5.5 Medium
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::Tuple::validate.
CVE-2021-45861 1 Tsmuxer Project 1 Tsmuxer 2024-08-04 5.5 Medium
There is an Assertion `num <= INT_BIT' failed at BitStreamReader::skipBits in /bitStream.h:132 of tsMuxer git-c6a0277.
CVE-2021-46048 1 Webassembly 1 Binaryen 2024-08-04 5.5 Medium
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::readFunctions.
CVE-2021-45387 1 Broadcom 1 Tcpreplay 2024-08-04 5.5 Medium
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv4() at tree.c.
CVE-2021-45386 1 Broadcom 1 Tcpreplay 2024-08-04 5.5 Medium
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c
CVE-2021-45290 2 Fedoraproject, Webassembly 2 Fedora, Binaryen 2024-08-04 7.5 High
A Denial of Service vulnerability exits in Binaryen 103 due to an assertion abort in wasm::handle_unreachable.
CVE-2021-44994 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0.
CVE-2021-44993 1 Jerryscript 1 Jerryscript 2024-08-04 5.5 Medium
There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0.
CVE-2021-44022 2 Microsoft, Trendmicro 2 Windows, Apex One 2024-08-04 5.5 Medium
A reachable assertion vulnerability in Trend Micro Apex One could allow an attacker to crash the program on affected installations, leading to a denial-of-service (DoS). Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.