CVE-2023-28451
https://notcve.org/view.php?id=CVE-2023-28451
There is a vulnerability (called BadDNS) in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing DoS (denial of service) for normal resolution. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3. https://technitium.com/dns • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-34057
https://notcve.org/view.php?id=CVE-2024-34057
The resulting buffer overflow can cause a crash, resulting in a denial of service. • https://trianglemicroworks.com/products/source-code-libraries/iec-61850-scl-pages/what%27s-new https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-16 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-46584
https://notcve.org/view.php?id=CVE-2024-46584
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. • https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#20fb6e1bcec049728e6319d9da46416d •
CVE-2023-28456
https://notcve.org/view.php?id=CVE-2023-28456
It enables attackers to launch amplification attacks (3 times more than other "golden model" software like BIND) and cause potential DoS. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3 https://technitium.com/dns • CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •
CVE-2024-46555
https://notcve.org/view.php?id=CVE-2024-46555
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. • https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#e15d03bdd4b9441e8eb157fbd09969f4 •