CVE-2024-33781
https://notcve.org/view.php?id=CVE-2024-33781
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message. ... Esta vulnerabilidad permite a los atacantes provocar una denegación de servicio (DoS) mediante un mensaje manipulado. • https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-octetStream • CWE-121: Stack-based Buffer Overflow CWE-125: Out-of-bounds Read •
CVE-2024-21477 – Buffer Over-read in WLAN Firmware
https://notcve.org/view.php?id=CVE-2024-21477
Transient DOS while parsing a protected 802.11az Fine Time Measurement (FTM) frame. DOS transitorio mientras se analiza un cuadro de medición de tiempo fino (FTM) 802.11az protegido. • https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2023-43529 – Reachable Assertion in Data Modem
https://notcve.org/view.php?id=CVE-2023-43529
Transient DOS while processing IKEv2 Informational request messages, when a malformed fragment packet is received. DOS transitorio mientras se procesan mensajes de solicitud informativa IKEv2, cuando se recibe un paquete de fragmentos con formato incorrecto. • https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html • CWE-617: Reachable Assertion •
CVE-2024-32972 – go-ethereum denial of service via malicious p2p message
https://notcve.org/view.php?id=CVE-2024-32972
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to 1.13.15, a vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix has been included in geth version `1.13.15` and onwards. go-ethereum (geth) es una implementación de la capa de ejecución golang del protocolo Ethereum. Antes de 13.01.15, se podía hacer que un nodo vulnerable consumiera cantidades muy grandes de memoria al manejar mensajes p2p especialmente manipulados enviados desde un nodo atacante. La solución se incluyó en la versión geth `1.13.15` y posteriores. • https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15 https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652 • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-4549 – Delta Electronics DIAEnergie SQL Injection
https://notcve.org/view.php?id=CVE-2024-4549
A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. • https://www.tenable.com/security/research/tra-2024-13 • CWE-400: Uncontrolled Resource Consumption •