Page 47 of 38332 results (0.233 seconds)

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-416: Use After Free •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

A successful exploit of this vulnerability may lead to denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

This can lead to degraded performance and eventually denial of service in well orchestrated attacks. • https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-8508.txt • CWE-606: Unchecked Input for Loop Condition •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service. • https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-04.html • CWE-20: Improper Input Validation •

CVSS: -EPSS: 0%CPEs: 1EXPL: 0

Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue. • https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1 • CWE-400: Uncontrolled Resource Consumption •