Show filters
220 Total Results
Displaying 31-40 of 220
Sort by:
Attacker Value
Unknown

CVE-2022-24792

Disclosure Date: April 25, 2022 (last updated February 23, 2025)
PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first.
Attacker Value
Unknown

CVE-2022-24859

Disclosure Date: April 18, 2022 (last updated February 23, 2025)
PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In versions prior to 1.27.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if the PyPDF2 if the code attempts to get the content stream. The reason is that the last while-loop in `ContentStream._readInlineImage` only terminates when it finds the `EI` token, but never actually checks if the stream has already ended. This issue has been resolved in version `1.27.5`. Users unable to upgrade should validate and PDFs prior to iterating over their content stream.
Attacker Value
Unknown

CVE-2022-24191

Disclosure Date: April 04, 2022 (last updated February 23, 2025)
In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw function can lead to a pointer arbitrarily pointing to heap memory and resulting in a buffer overflow.
Attacker Value
Unknown

CVE-2022-1222

Disclosure Date: April 04, 2022 (last updated February 23, 2025)
Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.
Attacker Value
Unknown

CVE-2022-24763

Disclosure Date: March 30, 2022 (last updated February 23, 2025)
PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.
Attacker Value
Unknown

CVE-2022-23352

Disclosure Date: March 21, 2022 (last updated February 23, 2025)
An issue in BigAnt Software BigAnt Server v5.6.06 can lead to a Denial of Service (DoS).
Attacker Value
Unknown

CVE-2021-3737

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2022-0711

Disclosure Date: March 02, 2022 (last updated February 23, 2025)
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
Attacker Value
Unknown

CVE-2022-21159

Disclosure Date: February 28, 2022 (last updated February 23, 2025)
A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerability.
Attacker Value
Unknown

CVE-2021-4021

Disclosure Date: February 24, 2022 (last updated February 23, 2025)
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.