Page 104 of 38507 results (0.115 seconds)

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

There is a vulnerability (called BadDNS) in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing DoS (denial of service) for normal resolution. The effects of an exploit would be widespread and highly impactful, because the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3. https://technitium.com/dns • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.2EPSS: 0%CPEs: -EXPL: 0

The resulting buffer overflow can cause a crash, resulting in a denial of service. • https://trianglemicroworks.com/products/source-code-libraries/iec-61850-scl-pages/what%27s-new https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-16 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. • https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#20fb6e1bcec049728e6319d9da46416d •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

It enables attackers to launch amplification attacks (3 times more than other "golden model" software like BIND) and cause potential DoS. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3 https://technitium.com/dns • CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. • https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#e15d03bdd4b9441e8eb157fbd09969f4 •