CVE-2024-46580
https://notcve.org/view.php?id=CVE-2024-46580
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. • https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#230c640b5e354e20b5b529a510079eea •
CVE-2024-46583
https://notcve.org/view.php?id=CVE-2024-46583
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. • https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#0f15f2bf2eb448c381255850e43cf96a •
CVE-2024-46595
https://notcve.org/view.php?id=CVE-2024-46595
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. • https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#7f26d2119de54d5fbc25a8d3ebe2b16c •
CVE-2023-28451
https://notcve.org/view.php?id=CVE-2023-28451
There is a vulnerability (called BadDNS) in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing DoS (denial of service) for normal resolution. The effects of an exploit would be widespread and highly impactful, because the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3. https://technitium.com/dns • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-34057
https://notcve.org/view.php?id=CVE-2024-34057
The resulting buffer overflow can cause a crash, resulting in a denial of service. • https://trianglemicroworks.com/products/source-code-libraries/iec-61850-scl-pages/what%27s-new https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-16 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •