CWE:
 

Tytuł
Data
Autor
Med.
FTPDMIN 0.96 - Denial of Service (DoS)
02.01.2024
Fernando Mengali
Med.
Ultra Mini HTTPd 1.21 - Denial of Service (DoS)
01.01.2024
Fernando Mengali
Med.
Scdbg 1.0 Buffer overflow DoS
27.03.2023
Rafael Pedrero
Med.
Scdbg 1.0 Denial Of Service
27.03.2023
Rafael Pedrero
Med.
SAP NetWeaver Java Denial Of Service
06.05.2022
Gaston Traberg
Med.
ModSecurity 3.0.x Denial Of Service
17.09.2020
Christian Folini
Med.
ZyXEL P-660HW UDP fragmentation Denial of Service
12.01.2018
Hosein Askari
Med.
ZyXEL TTL Expiry Denial of Service
25.12.2017
Hosein Askari
Low
Android Private Internet Access Denial Of Service
30.10.2017
nightwatchcybersecurit...
Low
libgedit.a mishandling NUL Blocks in gedit(GNOME text editor)
02.09.2017
Hosein Askari
Low
Trihedral VTScada DoS / XSS / Information Disclosure
01.07.2017
Karn Ganeshen
Med.
MikroTik UDP Flood Denial of Service
10.05.2017
Hosein Askari
Med.
BackBox OS Denial Of Service(CPU Consumption)
01.04.2017
Hosein Askari(FarazPaj...
Med.
MikroTik RouterBoard V-6.38.5 Denial Of Service | CPU Consumption
28.03.2017
Hosein Askari (FarazPa...
Med.
Android Qualcomm GPS/GNSS Man-In-The-Middle
12.10.2016
Yakov Shafranovich
Low
Open-Xchange App Suite 7.8.1 Information Disclosure
23.06.2016
Martin Heiland
Med.
SAP Afaria 7 XcListener DoS in the module XeClient.Dll
19.06.2015
Vahagn Vardanyan
Med.
XMPP-Layer Compression Uncontrolled Resource Consumption
06.04.2014
Giancarlo Pellegrino
Low
Guitar Pro 6.1.1 r10791 (.gpx) Denial of Service Exploit
06.05.2012
condis


Common Weakness Enumeration (CWE)

CVE
Szczegóły
Opis
2024-10-22
Waiting for details
CVE-2024-50311

Updating...
 

 
A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.

 
2024-10-11
Waiting for details
CVE-2024-47497

Updating...
 

 
An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS). An attacker can send specific HTTPS connection requests to the device, triggering the creation of processes that are not properly terminated. Over time, this leads to resource exhaustion, ultimately causing the device to crash and restart. The following command can be used to monitor the resource usage: user@host> show system processes extensive | match mgd | count This issue affects Junos OS on SRX Series and EX Series: All versions before 21.4R3-S7, from 22.2 before 22.2R3-S4, from 22.3 before 22.3R3-S3, from 22.4 before 22.4R3-S2, from 23.2 before 23.2R2-S1, from 23.4 before 23.4R1-S2, 23.4R2.

 
2024-10-09
Waiting for details
CVE-2024-7294

Updating...
 

 
In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), an HTTP DoS attack is possible on anonymous endpoints without rate limiting.

 
2024-10-08
Waiting for details
CVE-2024-43575

Updating...
 

 
Windows Hyper-V Denial of Service Vulnerability

 
Waiting for details
CVE-2024-43545

Updating...
 

 
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability

 
Waiting for details
CVE-2024-43544

Updating...
 

 
Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability

 
Waiting for details
CVE-2024-43541

Updating...
 

 
Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability

 
Waiting for details
CVE-2024-43515

Updating...
 

 
Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability

 
Waiting for details
CVE-2024-43506

Updating...
 

 
BranchCache Denial of Service Vulnerability

 
Waiting for details
CVE-2024-38149

Updating...
 

 
BranchCache Denial of Service Vulnerability

 

 


Copyright 2024, cxsecurity.com

 

Back to Top