CVE-2024-33071 – Buffer Over-read in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2024-33071
07 Oct 2024 — Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-33070 – Buffer Over-read in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2024-33070
07 Oct 2024 — Transient DOS while parsing ESP IE from beacon/probe response frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-33069 – Use After Free in WLAN Host
https://notcve.org/view.php?id=CVE-2024-33069
07 Oct 2024 — Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-416: Use After Free •
CVE-2024-33049 – Buffer Over-read in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2024-33049
07 Oct 2024 — Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-20094
https://notcve.org/view.php?id=CVE-2024-20094
07 Oct 2024 — This could lead to remote denial of service with no additional execution privileges needed. • https://corp.mediatek.com/product-security-bulletin/October-2024 • CWE-617: Reachable Assertion •
CVE-2024-47850 – cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
https://notcve.org/view.php?id=CVE-2024-47850
04 Oct 2024 — (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) ... This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added. • https://www.akamai.com/blog/security-research/october-cups-ddos-threat • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-0125
https://notcve.org/view.php?id=CVE-2024-0125
03 Oct 2024 — A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-476: NULL Pointer Dereference •
CVE-2024-0124
https://notcve.org/view.php?id=CVE-2024-0124
03 Oct 2024 — A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-416: Use After Free •
CVE-2024-0123
https://notcve.org/view.php?id=CVE-2024-0123
03 Oct 2024 — A successful exploit of this vulnerability may lead to denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input •
CVE-2024-8508 – Unbounded name compression could lead to Denial of Service
https://notcve.org/view.php?id=CVE-2024-8508
03 Oct 2024 — This can lead to degraded performance and eventually denial of service in well orchestrated attacks. ... A flaw was found in Unbound which can lead to degraded performance and an eventual denial of service when handling replies with very large RRsets that require name compression to be applied. ... Issues addressed include a denial of service vulnerability. • https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-8508.txt • CWE-606: Unchecked Input for Loop Condition •