Page 296 of 38542 results (0.087 seconds)

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

An attacker could use this vulnerability to prevent any user to perform actions in the system, causing a denial of service situation. • https://cert-portal.siemens.com/productcert/html/ssa-916916.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 6.2EPSS: 0%CPEs: 4EXPL: 0

A local unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service. • https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

A local high privilege attacker could potentially exploit this vulnerability, leading to denial of service. • https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities • CWE-73: External Control of File Name or Path •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service. • https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities • CWE-241: Improper Handling of Unexpected Data Type •

CVSS: 3.6EPSS: 0%CPEs: 3EXPL: 0

Use after free issue in editcap could cause denial of service via crafted capture file Un problema de Use after free en editcap podría causar denegación de servicio a través de un archivo de captura manipulado • https://gitlab.com/wireshark/wireshark/-/issues/19782 https://gitlab.com/wireshark/wireshark/-/issues/19783 https://gitlab.com/wireshark/wireshark/-/issues/19784 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2BSENPSIALF2WIZF7M3QBVWYBMFGW https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MKFJAZDKXGFFQPRDYLX2AANRNMYZZEZ https://www.wireshark.org/security/wnpa-sec-2024-08.html • CWE-416: Use After Free •