Show filters
291 Total Results
Displaying 11-20 of 291
Sort by:
Attacker Value
Unknown

CVE-2021-22882

Disclosure Date: February 23, 2021 (last updated February 22, 2025)
UniFi Protect before v1.17.1 allows an attacker to use spoofed cameras to perform a denial-of-service attack that may cause the UniFi Protect controller to crash.
Attacker Value
Unknown

CVE-2020-27782

Disclosure Date: February 23, 2021 (last updated February 22, 2025)
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.
Attacker Value
Unknown

CVE-2020-11270

Disclosure Date: February 22, 2021 (last updated February 22, 2025)
Possible denial of service due to RTT responder consistently rejects all FTMR by transmitting FTM1 with failure status in the FTM parameter IE in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
Attacker Value
Unknown

CVE-2021-27405

Disclosure Date: February 19, 2021 (last updated February 22, 2025)
A ReDoS (regular expression denial of service) flaw was found in the @progfay/scrapbox-parser package before 6.0.3 for Node.js.
Attacker Value
Unknown

CVE-2020-28496

Disclosure Date: February 18, 2021 (last updated February 22, 2025)
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms")
Attacker Value
Unknown

CVE-2021-1378

Disclosure Date: February 17, 2021 (last updated February 22, 2025)
A vulnerability in the SSH service of the Cisco StarOS operating system could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error that may occur under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to prevent the targeted service from receiving any traffic, which would lead to a DoS condition on the affected device.
Attacker Value
Unknown

CVE-2020-24504

Disclosure Date: February 17, 2021 (last updated February 22, 2025)
Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable denial of service via local access.
Attacker Value
Unknown

CVE-2021-21317

Disclosure Date: February 16, 2021 (last updated February 22, 2025)
uap-core in an open-source npm package which contains the core of BrowserScope's original user agent string parser. In uap-core before version 0.11.0, some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. This is fixed in version 0.11.0. Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
Attacker Value
Unknown

CVE-2020-35559

Disclosure Date: February 16, 2021 (last updated February 22, 2025)
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unused function that allows an authenticated attacker to use up all available IPs of an account and thus not allow creation of new devices and users.
Attacker Value
Unknown

CVE-2020-13949

Disclosure Date: February 12, 2021 (last updated February 22, 2025)
In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.