Page 142 of 39702 results (0.279 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

27 Aug 2024 — Instances of the Apollo Router running versions >=1.21.0 and < 1.52.1 are impacted by a denial of service vulnerability if _all_ of the following are true: 1. ... Instances of the Apollo Router running versions >=1.7.0 and <1.52.1 are impacted by a denial-of-service vulnerability if all of the following are true: 1. ... If you cannot upgrade, you can mitigate the denial-of-service opportunity impacting External Coprocessors by setting the coproc... • https://github.com/apollographql/router/commit/7a9c020608a62dcaa306b72ed0f6980f15923b14 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

27 Aug 2024 — An Unauthenticated Denial of Service (DoS) vulnerability exists in Flowise version 1.8.2 leading to a complete crash of the instance running a vulnerable version due to improper handling of user supplied input to the “/api/v1/get-upload-file” api endpoint. • https://tenable.com/security/research/tra-2024-34 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

27 Aug 2024 — The MPD package included in TwinCAT/BSD allows an authenticated, low-privileged local attacker to induce a Denial-of-Service (DoS) condition on the daemon and execute code in the context of user “root” via a crafted HTTP request. The MPD package included in TwinCAT/BSD allows an authenticated, low-privileged local attacker to induce a Denial-of-Service (DoS) condition on the daemon and execute code in the context of user “ro... • https://cert.vde.com/en/advisories/VDE-2024-050 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

27 Aug 2024 — The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local denial-of-service attack by a low privileged attacker. • https://cert.vde.com/en/advisories/VDE-2024-049 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

26 Aug 2024 — If successful, the application host will quickly run out of memory, after which the application will likely be terminated by an OOM killer, leading to denial of service. • https://github.com/bytecodealliance/rustix/security/advisories/GHSA-c827-hfw6-qwvm • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

26 Aug 2024 — A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/ae00e6536a2dd54b64b39e9a39548870cf835745 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

26 Aug 2024 — A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/b1453a5616c7bd8acd90633ceba4e59105ba3b51 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

26 Aug 2024 — A local attacker could possibly use this to cause a denial of service. • https://git.kernel.org/stable/c/53023ab11836ac56fd75f7a71ec1356e50920fa9 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

26 Aug 2024 — A local attacker could possibly use this to cause a denial of service. • https://git.kernel.org/stable/c/bd04a149e3a29e7f71b7956ed41dba34e42d539e •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

26 Aug 2024 — A local attacker could possibly use this to cause a denial of service. • https://git.kernel.org/stable/c/e2ffcda1629012a2c1a3706432bc45fdc899a584 •