Page 11 of 49861 results (0.015 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

20 Mar 2025 — In version 3.25.0 of aimhubio/aim, the tracking server is vulnerable to a denial of service attack. ... This causes the server to become unresponsive to other requests while processing the large image, leading to a denial of service condition. • https://huntr.com/bounties/e4c9bf41-72cf-4d04-baaf-8f12b5b7926e • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

20 Mar 2025 — This can lead to a Denial of Service (DoS) attack via remote network. • https://huntr.com/bounties/522c87b6-a7ac-41b2-84f3-62fd58921f21 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — Realchar version v0.0.4 is vulnerable to an unauthenticated denial of service (DoS) attack. • https://huntr.com/bounties/6db72368-e7bc-43ee-a4ae-6092f710c263 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This vulnerability can lead to a Denial of Service (DoS) condition when a user submits excessively large strings, exhausting server resources such as CPU, memory, and disk space, and rendering the service unavailable for legitimate users. • https://huntr.com/bounties/c7c0a4e6-acd3-49b4-8684-2c2c27014b76 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — The server does not limit or validate the length of the boundary or the characters appended to it, allowing an attacker to craft requests with excessively long boundaries, leading to resource exhaustion and eventual denial of service (DoS). • https://huntr.com/bounties/63f5aea4-953b-4b38-9f10-3afe425be1d4 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A vulnerability in the `/3/ImportFiles` endpoint of h2oai/h2o-3 version 3.46.1 allows an attacker to cause a denial of service. • https://huntr.com/bounties/3fe640df-bef4-4072-8890-0d12bc2818f6 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A vulnerability in BerriAI/litellm, as of commit 26c03c9, allows unauthenticated users to cause a Denial of Service (DoS) by exploiting the use of ast.literal_eval to parse user input. This function is not safe and is prone to DoS attacks, which can crash the litellm Python server. • https://github.com/berriai/litellm/commit/21156ff5d0d84a7dd93f951ca033275c77e4f73c • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A Denial of Service (DoS) vulnerability was discovered in the file upload feature of netease-youdao/qanything version v2.0.0. • https://huntr.com/bounties/365c3b9a-180c-4bb5-98d8-dbd78d93fcb7 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This can lead to excessive resource consumption, potentially resulting in a Denial of Service (DoS) and other significant issues, impacting the system's stability and security. • https://huntr.com/bounties/b5991b98-a721-4acd-8ef2-980e15682913 • CWE-284: Improper Access Control •

CVSS: 6.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A Denial of Service (DoS) vulnerability exists in the file upload feature of gaizhenbiao/chuanhuchatgpt version 20240914. • https://huntr.com/bounties/c89a1dfd-a733-41b3-af20-6ef6024361eb • CWE-400: Uncontrolled Resource Consumption •