CVE-2024-0027
https://notcve.org/view.php?id=CVE-2024-0027
This could lead to local denial of service with no additional execution privileges needed. • https://android.googlesource.com/platform/frameworks/base/+/a8fb9fe93efdebc4145e00934f42c91742f328de https://source.android.com/security/bulletin/2024-04-01 •
CVE-2024-0026
https://notcve.org/view.php?id=CVE-2024-0026
In multiple functions of SnoozeHelper.java, there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. • https://android.googlesource.com/platform/frameworks/base/+/a8fb9fe93efdebc4145e00934f42c91742f328de https://source.android.com/security/bulletin/2024-04-01 • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-34084 – Minder's Github Webhook Handler vulnerable to denial of service from un-validated requests
https://notcve.org/view.php?id=CVE-2024-34084
Minder's `HandleGithubWebhook` is susceptible to a denial of service attack from an untrusted HTTP request. • https://github.com/stacklok/minder/commit/3e5a527d2f1b535159206161d1d519602c75bd0d https://github.com/stacklok/minder/security/advisories/GHSA-9c5w-9q3f-3hv7 • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-4599 – Denial of service vulnerability in LAN Messenger
https://notcve.org/view.php?id=CVE-2024-4599
Remote denial of service vulnerability in LAN Messenger affecting version 3.4.0. This vulnerability allows an attacker to crash the LAN Messenger service by sending a long string directly and continuously over the UDP protocol. • https://www.incibe.es/en/incibe-cert/notices/aviso/denial-service-vulnerability-lan-messenger • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-23808 – Arkcompiler ets frontend has an out-of-bounds read vulnerability
https://notcve.org/view.php?id=CVE-2024-23808
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference. En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecución de código arbitrario en aplicaciones preinstaladas mediante use after free o provocan DOS mediante la desreferencia del puntero NULL. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md • CWE-125: Out-of-bounds Read CWE-476: NULL Pointer Dereference •