CVE-2024-29068 – snapd non-regular file indefinite blocking read
https://notcve.org/view.php?id=CVE-2024-29068
An attacker who could convince a user to install a malicious snap which contained non-regular files at these paths could then cause snapd to block indefinitely trying to read from such files and cause a denial of service. • https://github.com/snapcore/snapd/commit/b66fee81606a1c05f965a876ccbaf44174194063 https://github.com/snapcore/snapd/pull/13682 • CWE-20: Improper Input Validation •
CVE-2024-3297 – Session establishment lock-up during replay of CASE Sigma1 messages
https://notcve.org/view.php?id=CVE-2024-3297
Un problema en el protocolo de establecimiento de sesión autenticado por certificado (CASE) para establecer sesiones seguras entre dos dispositivos, tal como se implementó en las versiones del protocolo Matter anteriores a Matter 1.1, permite a un atacante reproducir mensajes CASE Sigma1 manipulados para que el dispositivo no responda hasta que se encienda ciclado. • https://www.bitdefender.com/support/security-advisories/session-establishment-lock-up-during-replay-of-case-sigma1-messages • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-40575
https://notcve.org/view.php?id=CVE-2024-40575
An issue in Huawei Technologies opengauss (openGauss 5.0.0 build) v.7.3.0 allows a local attacker to cause a denial of service via the modification of table attributes • https://gist.github.com/RuiHuaLiu2023/92059b0fa6c625e3d39001c5a9b2dc71 https://opengauss.org •
CVE-2020-11639 – Insufficient access control on Inter process communication,
https://notcve.org/view.php?id=CVE-2020-11639
The process could crash or cause communication issues on the affected node, effectively causing a denial-of-service attack. • https://search.abb.com/library/Download.aspx?DocumentID=3BUA003421&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.200044199.882581162.1721753430-284724496.1718609177 • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •
CVE-2024-41655 – TF2 Item Format Regular Expression Denial of Service vulnerability
https://notcve.org/view.php?id=CVE-2024-41655
Versions of `tf2-item-format` since at least `4.2.6` and prior to `5.9.14` are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any `tf2-item-format` to parse user input. ... Un atacante puede aprovechar esta vulnerabilidad para realizar ataques DoS en cualquier servicio que utilice cualquier "tf2-item-format" para analizar la entrada del usuario. • https://github.com/danocmx/node-tf2-item-format/commit/5cffcc16a9261d6a937bda72bfe6830e02e31eec https://github.com/danocmx/node-tf2-item-format/releases/tag/v5.9.14 https://github.com/danocmx/node-tf2-item-format/security/advisories/GHSA-8h55-q5qq-p685 • CWE-624: Executable Regular Expression Error CWE-1333: Inefficient Regular Expression Complexity •