Page 170 of 39713 results (0.352 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

07 Aug 2024 — A local attacker could possibly use this to cause a denial of service. • https://git.kernel.org/stable/c/9bcef5973e31020e5aa8571eb994d67b77318356 •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 0

07 Aug 2024 — An attacker who has domain admin access can exploit this to gain root admin and other-account privileges and perform malicious operations that can result in compromise of resources integrity and confidentiality, data loss, denial of service and availability of CloudStack managed infrastructure. An attacker who has domain admin access can exploit this to gain root admin and other-account privileges and perform malicious operations that can result in compromise of resources integrity and ... • https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

07 Aug 2024 — The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. ... Processing very large inputs with a specific sequence of characters with the urlize and urlizetrunc functions can cause a denial of service. • https://docs.djangoproject.com/en/dev/releases/security • CWE-130: Improper Handling of Length Parameter Inconsistency •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

07 Aug 2024 — The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. ... 'urlize', 'urlizetrunc', and 'AdminURLFieldWidget' may be subject to a denial of service attack via certain inputs with a very large number of Unicode characters. • https://docs.djangoproject.com/en/dev/releases/security • CWE-130: Improper Handling of Length Parameter Inconsistency CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

06 Aug 2024 — Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

06 Aug 2024 — Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

06 Aug 2024 — Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

06 Aug 2024 — Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

06 Aug 2024 — Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

06 Aug 2024 — There is a denial of service (DOS) vulnerability in the TTF parser. ... This library, whether used as a standalone binary or as part of another application, is vulnerable to DOS attacks when parsing certain types of files. • https://github.com/michaelrsweet/pdfio/commit/e4e1c39578279386b0ab9f9ac14b20a8bad4f935 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •