38450 results (0.048 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A buffer overflow leading to a denial of service has been found in the NVD Tools, a collection of tools for working with National Vulnerability Database feeds. • https://github.com/facebookincubator/nvdtools https://github.com/facebookincubator/nvdtools/pull/201/commits/81447a60e831223814cc146df3bb172dfd4d52f8 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity. • https://access.redhat.com/errata/RHSA-2024:10175 https://access.redhat.com/errata/RHSA-2024:10176 https://access.redhat.com/errata/RHSA-2024:10177 https://access.redhat.com/errata/RHSA-2024:10178 https://access.redhat.com/security/cve/CVE-2024-10270 https://bugzilla.redhat.com/show_bug.cgi?id=2321214 • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 4.7EPSS: 0%CPEs: -EXPL: 0

The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. • https://access.redhat.com/errata/RHSA-2024:10175 https://access.redhat.com/errata/RHSA-2024:10176 https://access.redhat.com/errata/RHSA-2024:10177 https://access.redhat.com/errata/RHSA-2024:10178 https://access.redhat.com/security/cve/CVE-2024-9666 https://bugzilla.redhat.com/show_bug.cgi?id=2317440 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. • https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: -EXPL: 0

The Imager package before 1.025 for Perl has a heap-based buffer overflow leading to denial of service, or possibly unspecified other impact, when the trim() method is called on a crafted input image. • https://github.com/briandfoy/cpan-security-advisory/issues/167 https://github.com/briandfoy/cpan-security-advisory/issues/171 https://github.com/tonycoz/imager/issues/534 https://metacpan.org/release/TONYC/Imager-1.025/changes • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •