49944 results (0.005 seconds)

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

28 Mar 2025 — If this vulnerability is exploited, an attacker may delete a file on the device or cause a denial of service (DoS) condition. • https://jvn.jp/en/jp/JVN04278547 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

28 Mar 2025 — This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. • https://gist.github.com/mestrtee/32c0a48023036e51918f6a098f21953d •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

28 Mar 2025 — This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. • https://gist.github.com/mestrtee/4c5dfb66bea377889c44dd6c8af28713 •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

28 Mar 2025 — A prototype pollution in the component Module.mergeObjects (redoc/bundles/redoc.lib.js:2) of redoc <= 2.2.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload. • https://github.com/Redocly/redoc/issues/2499 •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

27 Mar 2025 — This vulnerability could directly lead to a denial of service (DoS) attack against the server. • https://github.com/mesop-dev/mesop/commit/748e20d4a363d89b841d62213f5b0c6b4bed788f • CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Mar 2025 — Synapse is an open source Matrix homeserver implementation. A malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild and has been fixed in Synapse v1.127.1. No known workarounds are available. • https://github.com/element-hq/synapse/commit/2277df2a1eb685f85040ef98fa21d41aa4cdd389 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

27 Mar 2025 — A segmentation fault in openairinterface5g v2.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted UE Context Modification response. • https://anonymous.4open.science/r/Mobicom-ARCANE-36B7/README.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

27 Mar 2025 — This results in a denial-of-service condition for affected Starknet full-node implementations. • https://community.starknet.io/t/starknet-security-update-potential-full-node-vulnerability-recap/115314 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

27 Mar 2025 — An out-of-memory error in the parseABC_NS_SET_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion. • https://github.com/libming/libming/issues/330 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

27 Mar 2025 — This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file. • https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz4.readme • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •