Show filters
794 Total Results
Displaying 71-80 of 794
Sort by:
Attacker Value
Unknown
CVE-2023-3966
Disclosure Date: February 22, 2024 (last updated February 23, 2024)
A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.
0
Attacker Value
Unknown
CVE-2024-1635
Disclosure Date: February 19, 2024 (last updated October 22, 2024)
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.
At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree l…
0
Attacker Value
Unknown
CVE-2023-4408
Disclosure Date: February 13, 2024 (last updated October 22, 2024)
The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.
This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
0
Attacker Value
Unknown
CVE-2024-21985
Disclosure Date: January 26, 2024 (last updated February 06, 2024)
ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10
and 9.13.1P4 are susceptible to a vulnerability which could allow an
authenticated user with multiple remote accounts with differing roles to
perform actions via REST API beyond their intended privilege. Possible
actions include viewing limited configuration details and metrics or
modifying limited settings, some of which could result in a Denial of
Service (DoS).
0
Attacker Value
Unknown
CVE-2023-33295
Disclosure Date: January 19, 2024 (last updated January 31, 2024)
Cohesity DataProtect prior to 6.8.1_u5 or 7.1 was discovered to have a incorrect access control vulnerability due to a lack of TLS Certificate Validation.
0
Attacker Value
Unknown
CVE-2023-49515
Disclosure Date: January 17, 2024 (last updated January 25, 2024)
Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components.
0
Attacker Value
Unknown
CVE-2024-0565
Disclosure Date: January 15, 2024 (last updated July 08, 2024)
An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
0
Attacker Value
Unknown
CVE-2024-21982
Disclosure Date: January 12, 2024 (last updated January 19, 2024)
ONTAP versions 9.4 and higher are susceptible to a vulnerability
which when successfully exploited could lead to disclosure of sensitive
information to unprivileged attackers when the object-store profiler
command is being run by an administrative user.
0
Attacker Value
Unknown
CVE-2023-27098
Disclosure Date: January 09, 2024 (last updated January 13, 2024)
TP-Link Tapo APK up to v2.12.703 uses hardcoded credentials for access to the login panel.
0
Attacker Value
Unknown
CVE-2023-34829
Disclosure Date: December 28, 2023 (last updated January 06, 2024)
Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext.
0