Page 4 of 38394 results (0.002 seconds)

CVSS: 6.9EPSS: %CPEs: -EXPL: 0

The affected application does not properly restrict the size of generated log files. This could allow an unauthenticated remote attacker to trigger a large amount of logged events to exhaust the system's resources and create a denial of service condition. • https://cert-portal.siemens.com/productcert/html/ssa-915275.html • CWE-125: Out-of-bounds Read CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.5EPSS: 0%CPEs: 1EXPL: 0

A buffer overflow vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL. • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-and-buffer-overflow-vulnerabilities-in-gs1900-series-switches-11-12-2024 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 8.7EPSS: 0%CPEs: -EXPL: 0

In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the auto-generation function was identified. • https://portal.perforce.com/s/detail/a91PA000001SZNFYA4 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.7EPSS: 0%CPEs: -EXPL: 0

In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the refuse function was identified. • https://portal.perforce.com/s/detail/a91PA000001SZOrYAO • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.7EPSS: 0%CPEs: -EXPL: 0

In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. • https://portal.perforce.com/s/detail/a91PA000001SZQTYA4 • CWE-400: Uncontrolled Resource Consumption •