Page 87 of 39566 results (0.084 seconds)

CVSS: 6.2EPSS: 0%CPEs: -EXPL: 0

07 Oct 2024 — Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service. • https://www.solidigm.com/support-page/support-security.html • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 4.4EPSS: 0%CPEs: -EXPL: 0

07 Oct 2024 — Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service. • https://https://www.solidigm.com/support-page/support-security.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

07 Oct 2024 — Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service. • https://https://www.solidigm.com/support-page/support-security.html • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 4.4EPSS: 0%CPEs: -EXPL: 0

07 Oct 2024 — Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service. • https://https://www.solidigm.com/support-page/support-security.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

07 Oct 2024 — Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-62cq-cpmc-hvqq • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

07 Oct 2024 — Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. ... This flaw allows authenticated users to trigger a denial of service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST`, and ACL definitions. • https://github.com/redis/redis/commit/9317bf64659b33166a943ec03d5d9b954e86afb0 • CWE-674: Uncontrolled Recursion •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

07 Oct 2024 — An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. ... This flaw allows an authenticated attacker with sufficient privileges to create a malformed ACL selector that triggers a server panic and subsequent denial of service when accessed. • https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

07 Oct 2024 — Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service. • https://www.solidigm.com/support-page/support-security.html •

CVSS: 7.0EPSS: 0%CPEs: 11EXPL: 0

07 Oct 2024 — Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service. • https://https://www.solidigm.com/support-page/support-security.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

07 Oct 2024 — Transient DOS while parsing probe response and assoc response frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •