Show filters
641 Total Results
Displaying 81-90 of 641
Sort by:
Attacker Value
Unknown
CVE-2022-29243
Disclosure Date: May 31, 2022 (last updated February 23, 2025)
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available.
0
Attacker Value
Unknown
CVE-2021-3629
Disclosure Date: May 24, 2022 (last updated February 23, 2025)
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
0
Attacker Value
Unknown
CVE-2022-29202
Disclosure Date: May 20, 2022 (last updated February 23, 2025)
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.ragged.constant` does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
0
Attacker Value
Unknown
CVE-2022-29177
Disclosure Date: May 20, 2022 (last updated February 23, 2025)
Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack.
0
Attacker Value
Unknown
CVE-2022-27640
Disclosure Date: May 20, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SIMATIC CP 442-1 RNA (All versions < V1.5.18), SIMATIC CP 443-1 RNA (All versions < V1.5.18). The affected devices improperly handles excessive ARP broadcast requests. This could allow an attacker to create a denial of service condition by performing ARP storming attacks, which can cause the device to reboot.
0
Attacker Value
Unknown
CVE-2022-30551
Disclosure Date: May 20, 2022 (last updated February 23, 2025)
OPC UA Legacy Java Stack 2022-04-01 allows a remote attacker to cause a server to stop processing messages by sending crafted messages that exhaust available resources.
0
Attacker Value
Unknown
CVE-2022-28191
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where uncontrolled resource consumption can be triggered by an unprivileged regular user, which may lead to denial of service.
0
Attacker Value
Unknown
CVE-2021-33135
Disclosure Date: May 12, 2022 (last updated February 23, 2025)
Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.
0
Attacker Value
Unknown
CVE-2022-1699
Disclosure Date: May 12, 2022 (last updated February 23, 2025)
Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.
0
Attacker Value
Unknown
CVE-2022-29885
Disclosure Date: May 12, 2022 (last updated February 23, 2025)
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.
0