Page 128 of 38512 results (0.078 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

When using HedgeDoc 1 with MySQL or MariaDB, it is possible to create notes with an alias matching the ID of existing notes. ... The exploit requires knowledge of the ID of the target note. ... Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database. ... Users unable to upgrade may disable freeURL mode which prevents the exploitation of this issue. • https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pjf2-269h-cx7p https://github.com/hedgedoc/hedgedoc/commit/380587b7fd65bc1eb71eef51a3aab324f9877650 • CWE-1289: Improper Validation of Unsafe Equivalence in Input •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 7.5EPSS: 0%CPEs: 33EXPL: 0

Transient DOS while processing TIM IE from beacon frame as there is no check for IE length. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Transient DOS while parsing the received TID-to-link mapping element of beacon/probe response frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-126: Buffer Over-read •