Page 175 of 38413 results (0.026 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

An attacker who could convince a user to install a malicious snap which contained non-regular files at these paths could then cause snapd to block indefinitely trying to read from such files and cause a denial of service. • https://github.com/snapcore/snapd/commit/b66fee81606a1c05f965a876ccbaf44174194063 https://github.com/snapcore/snapd/pull/13682 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Un problema en el protocolo de establecimiento de sesión autenticado por certificado (CASE) para establecer sesiones seguras entre dos dispositivos, tal como se implementó en las versiones del protocolo Matter anteriores a Matter 1.1, permite a un atacante reproducir mensajes CASE Sigma1 manipulados para que el dispositivo no responda hasta que se encienda ciclado. • https://www.bitdefender.com/support/security-advisories/session-establishment-lock-up-during-replay-of-case-sigma1-messages • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An issue in Huawei Technologies opengauss (openGauss 5.0.0 build) v.7.3.0 allows a local attacker to cause a denial of service via the modification of table attributes • https://gist.github.com/RuiHuaLiu2023/92059b0fa6c625e3d39001c5a9b2dc71 https://opengauss.org •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

The process could crash or cause communication issues on the affected node, effectively causing a denial-of-service attack. • https://search.abb.com/library/Download.aspx?DocumentID=3BUA003421&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.200044199.882581162.1721753430-284724496.1718609177 • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Versions of `tf2-item-format` since at least `4.2.6` and prior to `5.9.14` are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any `tf2-item-format` to parse user input. ... Un atacante puede aprovechar esta vulnerabilidad para realizar ataques DoS en cualquier servicio que utilice cualquier "tf2-item-format" para analizar la entrada del usuario. • https://github.com/danocmx/node-tf2-item-format/commit/5cffcc16a9261d6a937bda72bfe6830e02e31eec https://github.com/danocmx/node-tf2-item-format/releases/tag/v5.9.14 https://github.com/danocmx/node-tf2-item-format/security/advisories/GHSA-8h55-q5qq-p685 • CWE-624: Executable Regular Expression Error CWE-1333: Inefficient Regular Expression Complexity •