Page 45 of 38324 results (0.052 seconds)

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

(The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) ... This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added. • https://github.com/OpenPrinting/cups https://www.akamai.com/blog/security-research/october-cups-ddos-threat https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8 https://access.redhat.com/security/cve/CVE-2024-47850 https://bugzilla.redhat.com/show_bug.cgi? • CWE-400: Uncontrolled Resource Consumption •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-476: NULL Pointer Dereference •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-416: Use After Free •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

A successful exploit of this vulnerability may lead to denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

This can lead to degraded performance and eventually denial of service in well orchestrated attacks. • https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-8508.txt • CWE-606: Unchecked Input for Loop Condition •