Page 80 of 38550 results (0.503 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file • https://www.wireshark.org/security/wnpa-sec-2024-13.html https://gitlab.com/wireshark/wireshark/-/issues/20114 • CWE-230: Improper Handling of Missing Values •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file • https://www.wireshark.org/security/wnpa-sec-2024-12.html https://gitlab.com/wireshark/wireshark/-/issues/20026 • CWE-456: Missing Initialization of a Variable •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. • https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md https://github.com/bitcoin/bitcoin/pull/26898 https://github.com/bitcoin/bitcoin/releases/tag/v25.0 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.7EPSS: 0%CPEs: 14EXPL: 0

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems with BGP traceoptions enabled and requires a BGP session to be already established.  • https://supportportal.juniper.net/JSA88102 https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/traceoptions-edit-protocols-bgp.html • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 8.7EPSS: 0%CPEs: 12EXPL: 0

An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems with BGP traceoptions enabled. ... An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems configured in either of two ways: * systems with BGP traceoptions enabled * systems with BGP traffic engineering configured This issue can affect iBGP and eBGP with any address family configured.  • https://supportportal.juniper.net/JSA88100 https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/traceoptions-edit-protocols-bgp.html • CWE-125: Out-of-bounds Read •