VYPR

CWE-476

NULL Pointer Dereference

BaseStableLikelihood: Medium

Description

The product dereferences a pointer that it expects to be valid but is NULL.

Hierarchy (View 1000)

Children

none

CVEs mapped to this weakness (1,024)

page 16 of 52
  • CVE-2003-1000HigJan 5, 2004
    risk 0.49cvss 7.5epss 0.01

    xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.

  • CVE-2002-1912HigDec 31, 2002
    risk 0.49cvss 7.5epss 0.02

    SkyStream EMR5000 1.16 through 1.18 does not drop packets or disable the Ethernet interface when the buffers are full, which allows remote attackers to cause a denial of service (null pointer exception and kernel panic) via a large number of packets.

  • CVE-2002-0401HigJun 18, 2002
    risk 0.49cvss 7.5epss 0.08

    SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.

  • CVE-1999-0052HigNov 4, 1998
    risk 0.49cvss 7.5epss 0.01

    IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.

  • CVE-2026-40414HigMay 12, 2026
    risk 0.48cvss 7.4epss 0.00

    Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.

  • CVE-2026-40413HigMay 12, 2026
    risk 0.48cvss 7.4epss 0.00

    Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.

  • CVE-2026-42800HigApr 30, 2026
    risk 0.48cvss 7.4epss 0.00

    NULL pointer dereference vulnerability in ASR1903 in ASR Lapwing_Linux on Linux (ims_client modules) allows Pointer Manipulation. This vulnerability is associated with program files sip/utils/src/sipuri.c.

  • CVE-2024-39356HigFeb 12, 2025
    risk 0.48cvss 7.4epss 0.00

    NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

  • CVE-2026-40401HigMay 12, 2026
    risk 0.46cvss 7.1epss 0.00

    Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service locally.

  • CVE-2026-26173HigApr 14, 2026
    risk 0.46cvss 7.0epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

  • CVE-2017-12952MedAug 28, 2017
    risk 0.46cvss 6.5epss 0.05

    The LoadString function in helper.h in libgig 4.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted gig file.

  • CVE-2017-12950MedAug 28, 2017
    risk 0.46cvss 6.5epss 0.04

    The gig::Region::Region function in gig.cpp in libgig 4.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted gig file.

  • CVE-2017-9124MedJun 12, 2017
    risk 0.46cvss 6.5epss 0.08

    The quicktime_match_32 function in util.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.

  • CVE-2017-4916MedMay 22, 2017
    risk 0.46cvss 6.5epss 0.10

    VMware Workstation Pro/Player contains a NULL pointer dereference vulnerability that exists in the vstor2 driver. Successful exploitation of this issue may allow host users with normal user privileges to trigger a denial-of-service in a Windows host machine.

  • CVE-2009-2516HigOct 14, 2009
    risk 0.46cvss 7.1epss 0.02

    The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly validate data sent from user mode, which allows local users to gain privileges via a crafted PE .exe file that triggers a NULL pointer dereference during chain traversal, aka "Windows Kernel NULL Pointer Dereference Vulnerability."

  • CVE-2024-41884MedDec 24, 2024
    risk 0.45cvss epss 0.01

    Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR. If an attacker does not enter any value for a specific URL parameter, NULL pointer references will occur and the NVR will reboot. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.

  • CVE-2024-41883MedDec 24, 2024
    risk 0.45cvss epss 0.01

    Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR . An attacker enters a special value for a specific URL parameter, resulting in a NULL pointer reference and a reboot of the NVR. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.

  • CVE-2025-20080MedFeb 10, 2026
    risk 0.44cvss 6.8epss 0.00

    Null pointer dereference in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability within Ring 0: Kernel may allow a denial of service. Network adversary with an unauthenticated user combined with a high complexity attack may enable denial of service. This result may potentially occur via network access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

  • CVE-2026-24805MedJan 27, 2026
    risk 0.44cvss epss 0.00

    NULL Pointer Dereference vulnerability in visualfc liteide (liteidex/src/3rdparty/libvterm/src modules). This vulnerability is associated with program files screen.C, state.C, vterm.C. This issue affects liteide: before x38.4.

  • CVE-2025-9337MedOct 13, 2025
    risk 0.44cvss epss 0.00

    A null pointer dereference has been identified in the AsIO3.sys driver. The vulnerability can be triggered by a specially crafted input, which may lead to a system crash (BSOD). Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.