Page 75 of 38455 results (0.210 seconds)

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

This could lead to remote denial of service with no additional execution privileges needed. • https://corp.mediatek.com/product-security-bulletin/October-2024 • CWE-617: Reachable Assertion •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

(The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) ... This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added. • https://github.com/OpenPrinting/cups https://www.akamai.com/blog/security-research/october-cups-ddos-threat https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8 https://access.redhat.com/security/cve/CVE-2024-47850 https://bugzilla.redhat.com/show_bug.cgi? • CWE-400: Uncontrolled Resource Consumption •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability in the nvdisam command line tool, where a user can cause a NULL pointer dereference by running nvdisasm on a malformed ELF file. A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-476: NULL Pointer Dereference •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-416: Use After Free •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

A successful exploit of this vulnerability may lead to denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input •