Page 146 of 38389 results (0.152 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Un problema en el protocolo de establecimiento de sesión autenticado por certificado (CASE) para establecer sesiones seguras entre dos dispositivos, tal como se implementó en las versiones del protocolo Matter anteriores a Matter 1.1, permite a un atacante reproducir mensajes CASE Sigma1 manipulados para que el dispositivo no responda hasta que se encienda ciclado. • https://www.bitdefender.com/support/security-advisories/session-establishment-lock-up-during-replay-of-case-sigma1-messages • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An issue in Huawei Technologies opengauss (openGauss 5.0.0 build) v.7.3.0 allows a local attacker to cause a denial of service via the modification of table attributes • https://gist.github.com/RuiHuaLiu2023/92059b0fa6c625e3d39001c5a9b2dc71 https://opengauss.org •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

The process could crash or cause communication issues on the affected node, effectively causing a denial-of-service attack. • https://search.abb.com/library/Download.aspx?DocumentID=3BUA003421&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.200044199.882581162.1721753430-284724496.1718609177 • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Versions of `tf2-item-format` since at least `4.2.6` and prior to `5.9.14` are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any `tf2-item-format` to parse user input. ... Un atacante puede aprovechar esta vulnerabilidad para realizar ataques DoS en cualquier servicio que utilice cualquier "tf2-item-format" para analizar la entrada del usuario. • https://github.com/danocmx/node-tf2-item-format/commit/5cffcc16a9261d6a937bda72bfe6830e02e31eec https://github.com/danocmx/node-tf2-item-format/releases/tag/v5.9.14 https://github.com/danocmx/node-tf2-item-format/security/advisories/GHSA-8h55-q5qq-p685 • CWE-624: Executable Regular Expression Error CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

This issue results in a denial of service of the bind server. • http://www.openwall.com/lists/oss-security/2024/07/23/1 https://kb.isc.org/docs/cve-2024-4076 http://www.openwall.com/lists/oss-security/2024/07/31/2 https://access.redhat.com/security/cve/CVE-2024-4076 https://bugzilla.redhat.com/show_bug.cgi?id=2298904 • CWE-617: Reachable Assertion •