37759 results (0.019 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A buffer overflow leading to a denial of service has been found in the NVD Tools, a collection of tools for working with National Vulnerability Database feeds. • https://github.com/facebookincubator/nvdtools https://github.com/facebookincubator/nvdtools/pull/201/commits/81447a60e831223814cc146df3bb172dfd4d52f8 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.5EPSS: 0%CPEs: -EXPL: 0

IBM MQ Operator 2.0.26 and 3.2.4 could allow a local user to cause a denial of service due to improper memory allocation causing a segmentation fault. • https://exchange.xforce.ibmcloud.com/vulnerabilities/297611 https://www.ibm.com/support/pages/node/7167732 • CWE-789: Memory Allocation with Excessive Size Value •

CVSS: 5.4EPSS: 0%CPEs: -EXPL: 0

If exploited, the vulnerability could allow users to launch a denial-of-service (DoS) attack via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.6.2722 build 20240402 and later QuTS hero h5.1.6.2734 build 20240414 and later • https://www.qnap.com/en/security-advisory/qsa-24-20 • CWE-476: NULL Pointer Dereference •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

The vulnerability can also lead to denial of service. • https://github.com/mindsdb/mindsdb/commit/5f7496481bd3db1d06a2d2e62c0dce960a1fe12b https://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

RapidIdentity LTS through 2023.0.2 and Cloud through 2024.08.0 improperly restricts excessive authentication attempts and allows a remote attacker to cause a denial of service via the username parameters. • https://benrogozinski.github.io/CVE-2024-45589 https://help.rapididentity.com/docs/rapididentity-lts-release-notes • CWE-307: Improper Restriction of Excessive Authentication Attempts •