Page 130 of 39671 results (0.181 seconds)

CVSS: 9.2EPSS: 0%CPEs: 2EXPL: 0

10 Sep 2024 — This denial of service condition could prevent legitimate users from using subsequent products that rely on the affected application for license verification. • https://cert-portal.siemens.com/productcert/html/ssa-103653.html • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.7EPSS: 0%CPEs: 18EXPL: 0

10 Sep 2024 — This could allow an unauthenticated remote attacker to cause a denial of service condition. • https://cert-portal.siemens.com/productcert/html/ssa-969738.html • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 27EXPL: 0

10 Sep 2024 — This could allow an unauthenticated attacker to cause a denial of service condition. • https://cert-portal.siemens.com/productcert/html/ssa-765405.html • CWE-284: Improper Access Control •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

10 Sep 2024 — This could allow a remote attacker with no privileges to cause a denial of service condition in the system. • https://cert-portal.siemens.com/productcert/html/ssa-423808.html • CWE-476: NULL Pointer Dereference •

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

10 Sep 2024 — This could allow a remote attacker with elevated privileges to cause a denial of service condition in the system. • https://cert-portal.siemens.com/productcert/html/ssa-423808.html • CWE-476: NULL Pointer Dereference •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

10 Sep 2024 — This could allow a remote attacker to cause a denial of service condition in the system. • https://cert-portal.siemens.com/productcert/html/ssa-423808.html • CWE-476: NULL Pointer Dereference •

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

10 Sep 2024 — A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service. • https://www.dell.com/support/kbdoc/en-us/000228412/dsa-2024-360-security-update-for-dell-powerscale-insightiq-for-multiple-security-vulnerabilities • CWE-269: Improper Privilege Management •

CVSS: 8.5EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable which can lead to a DoS. • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 8.5EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP environment variable which can lead to a DoS. A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_IN... • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 8.5EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS. A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS... • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •