CVE-2024-31228 – Denial-of-service due to unbounded pattern matching in Redis
https://notcve.org/view.php?id=CVE-2024-31228
Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. • https://github.com/redis/redis/commit/9317bf64659b33166a943ec03d5d9b954e86afb0 https://github.com/redis/redis/security/advisories/GHSA-66gq-c942-6976 • CWE-674: Uncontrolled Recursion •
CVE-2024-31227 – Denial-of-service due to malformed ACL selectors in Redis
https://notcve.org/view.php?id=CVE-2024-31227
An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. • https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a https://github.com/redis/redis/security/advisories/GHSA-38p4-26x2-vqhh • CWE-20: Improper Input Validation •
CVE-2024-47971
https://notcve.org/view.php?id=CVE-2024-47971
Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service. • https://www.solidigm.com/support-page/support-security.html •
CVE-2024-47975
https://notcve.org/view.php?id=CVE-2024-47975
Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service. • https://https://www.solidigm.com/support-page/support-security.html https://www.solidigm.com/support-page/support-security.html •
CVE-2024-38397 – Buffer Over-read in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2024-38397
Transient DOS while parsing probe response and assoc response frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •