Show filters
255 Total Results
Displaying 81-90 of 255
Sort by:
Attacker Value
Unknown

CVE-2022-23098

Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
Attacker Value
Unknown

CVE-2022-23968

Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Xerox VersaLink devices on specific versions of firmware before 2022-01-26 allow remote attackers to brick the device via a crafted TIFF file in an unauthenticated HTTP POST request. There is a permanent denial of service because image parsing causes a reboot, but image parsing is restarted as soon as the boot process finishes. However, this boot loop can be resolved by a field technician. The TIFF file must have an incomplete Image Directory. Affected firmware versions include xx.42.01 and xx.50.61. NOTE: the 2022-01-24 NeoSmart article included "believed to affect all previous and later versions as of the date of this posting" but a 2022-01-26 vendor statement reports "the latest versions of firmware are not vulnerable to this issue."
Attacker Value
Unknown

CVE-2022-23437

Disclosure Date: January 24, 2022 (last updated February 23, 2025)
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
Attacker Value
Unknown

CVE-2021-23567

Disclosure Date: January 14, 2022 (last updated February 23, 2025)
The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to have been revoked in an attempt to prevent them from fixing the issue. Vulnerable Code js for (let i = 666; i < Infinity; i++;) { Alternative Remediation Suggested * Pin dependancy to 1.4.0
Attacker Value
Unknown

CVE-2021-45445

Disclosure Date: January 12, 2022 (last updated February 23, 2025)
Unisys ClearPath MCP TCP/IP Networking Services 59.1, 60.0, and 62.0 has an Infinite Loop.
Attacker Value
Unknown

CVE-2021-40111

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.
Attacker Value
Unknown

CVE-2021-4182

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2021-4185

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2021-4190

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2021-4184

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file