Page 127 of 38413 results (0.032 seconds)

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

A buffer overflow vulnerability in the library "libclinkc" of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0 could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device. • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerability-in-some-5g-nr-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-security-router-devices-09-03-2024 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. ... They argue that this is a complex query bug and not a DoS vulnerability. • https://github.com/pingcap/tidb/issues/53796 https://gist.github.com/ycybfhb/eec3a1eefe4c85eb22f1bca6114359a1 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

This allows attackers to cause a Denial of Service (DoS) via a crafted input to the 'RemoveUnnecessaryFirstRow', it will check the expression between 'Agg' and 'GroupBy', but does not check the return type. ... This allows attackers to cause a Denial of Service (DoS) via a crafted input to the 'RemoveUnnecessaryFirstRow', it will check the expression between 'Agg' and 'GroupBy', but does not check the return type. ... They maintain it is a complex query bug in the product but not a DoS. • https://gist.github.com/ycybfhb/4aa6809695b9e8a1cd1429e597c17517 https://github.com/pingcap/tidb/issues/53733 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

This issue can go undetected until a server's `refuse()`/`ignore()` code path is exercised, such as to stop a denial of service attack. 2. • https://github.com/quinn-rs/quinn/security/advisories/GHSA-vr26-jcq5-fjj8 https://github.com/quinn-rs/quinn/commit/e01609ccd8738bd438d86fa7185a0f85598cb58f https://github.com/quinn-rs/quinn/blob/bb02a12a8435a7732a1d762783eeacbb7e50418e/quinn-proto/src/endpoint.rs#L213 • CWE-670: Always-Incorrect Control Flow Implementation •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Attackers can also use this issue to prevent access to the original note, causing a denial of service. • https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pjf2-269h-cx7p https://github.com/hedgedoc/hedgedoc/commit/380587b7fd65bc1eb71eef51a3aab324f9877650 • CWE-1289: Improper Validation of Unsafe Equivalence in Input •