Page 130 of 38512 results (0.120 seconds)

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

NVIDIA CUDA Toolkit contains a vulnerability in command `cuobjdump` where a user may cause an out-of-bound write by passing in a malformed ELF file. A successful exploit of this vulnerability may lead to code execution or denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5564 • CWE-787: Out-of-bounds Write •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

A successful exploit of this vulnerability may cause an out of bounds read in the unprivileged process memory which could lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5564 • CWE-125: Out-of-bounds Read •

CVSS: 6.3EPSS: 0%CPEs: 2EXPL: 0

A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering. • https://www.dell.com/support/kbdoc/en-us/000228207/dsa-2024-346-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities • CWE-61: UNIX Symbolic Link (Symlink) Following •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file • https://gitlab.com/wireshark/wireshark/-/issues/19943 https://www.wireshark.org/security/wnpa-sec-2024-11.html • CWE-825: Expired Pointer Dereference

CVSS: 8.6EPSS: 0%CPEs: 4EXPL: 0

A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. ... A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn • CWE-476: NULL Pointer Dereference •