Page 38 of 38452 results (0.030 seconds)

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

Ese cambio buscó correctamente evitar una inversión de srcu v. config_lock al dividir el desmontaje de la vCPU en dos partes, una protegida por config_lock. • https://git.kernel.org/stable/c/f616506754d34bcfdbfbc7508b562e5c98461e9a https://git.kernel.org/stable/c/6bcc2890b883ba1d16b8942937750565f6e9db0d https://git.kernel.org/stable/c/ae8f8b37610269009326f4318df161206c59843e •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

In certain conditions a request directed to the Waybox Enel X Web management application could cause a denial-of-service (e.g. reboot). • https://support-emobility.enelx.com/content/dam/enelxmobility/italia/documenti/manuali-schede-tecniche/Waybox-3-Security-Bulletin-06-2024-V1.pdf • CWE-284: Improper Access Control •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md • CWE-125: Out-of-bounds Read •

CVSS: 5.7EPSS: 0%CPEs: -EXPL: 0

These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request. ... Estas vulnerabilidades permiten a los atacantes provocar una denegación de servicio (DoS) a través de una solicitud POST manipulada. • https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_36/36.md https://www.netgear.com/about/security • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.7EPSS: 0%CPEs: -EXPL: 0

This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. ... Esta vulnerabilidad permite a los atacantes provocar una denegación de servicio (DoS) a través de una solicitud POST manipulada. • https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_40/40.md https://www.netgear.com/about/security • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •