Filtered by CWE-400
Total 3124 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-21547 1 Microsoft 9 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 6 more 2025-01-01 7.5 High
Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
CVE-2024-38236 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-12-31 7.5 High
DHCP Server Service Denial of Service Vulnerability
CVE-2024-26190 1 Microsoft 8 .net, Powershell, Visual Studio 2022 and 5 more 2024-12-31 7.5 High
Microsoft QUIC Denial of Service Vulnerability
CVE-2024-21392 2 Microsoft, Redhat 4 .net, Powershell, Visual Studio 2022 and 1 more 2024-12-31 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-20661 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-12-31 7.5 High
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVE-2024-53647 1 Trendmicro 1 Idsecurity 2024-12-31 6.5 Medium
Trend Micro ID Security, version 3.0 and below contains a vulnerability that could allow an attacker to send an unlimited number of email verification requests without any restriction, potentially leading to abuse or denial of service.
CVE-2024-21342 1 Microsoft 3 Windows 11 22h2, Windows 11 23h2, Windows Server 2022 23h2 2024-12-31 7.5 High
Windows DNS Client Denial of Service Vulnerability
CVE-2024-21404 2 Microsoft, Redhat 5 Asp.net Core, Visual Studio 2022, Enterprise Linux and 2 more 2024-12-31 7.5 High
.NET Denial of Service Vulnerability
CVE-2024-21386 2 Microsoft, Redhat 4 Asp.net Core, Visual Studio 2022, Enterprise Linux and 1 more 2024-12-31 7.5 High
.NET Denial of Service Vulnerability
CVE-2024-21319 2 Microsoft, Redhat 5 .net, Identity Model, Visual Studio 2022 and 2 more 2024-12-31 6.8 Medium
Microsoft Identity Denial of service vulnerability
CVE-2024-20672 1 Microsoft 1 .net 2024-12-31 7.5 High
.NET Denial of Service Vulnerability
CVE-2024-6501 1 Redhat 2 Enterprise Linux, Openshift 2024-12-31 3.1 Low
A flaw was found in NetworkManager. When a system running NetworkManager with DEBUG logs enabled and an interface eth1 configured with LLDP enabled, a malicious user could inject a malformed LLDP packet. NetworkManager would crash, leading to a denial of service.
CVE-2024-13058 2024-12-30 N/A
An issue exists in SoftIron HyperCloud where authenticated, but non-admin users can create data pools, which could potentially impact the performance and availability of the backend software-defined storage subsystem. This issue only impacts SoftIron HyperCloud and related software products (such as VM Squared) software versions 2.3.0 to before 2.5.0.
CVE-2024-35850 1 Linux 1 Linux Kernel 2024-12-30 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: fix NULL-deref on non-serdev setup Qualcomm ROME controllers can be registered from the Bluetooth line discipline and in this case the HCI UART serdev pointer is NULL. Add the missing sanity check to prevent a NULL-pointer dereference when setup() is called for a non-serdev controller.
CVE-2024-41123 2 Redhat, Ruby-lang 5 Enterprise Linux, Rhel E4s, Rhel Eus and 2 more 2024-12-27 5.3 Medium
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
CVE-2024-3056 3 Fedoraproject, Podman Project, Redhat 5 Fedora, Podman, Enterprise Linux and 2 more 2024-12-27 7.7 High
A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.
CVE-2018-12121 2 Nodejs, Redhat 9 Node.js, Enterprise Linux, Enterprise Linux Desktop and 6 more 2024-12-27 7.5 High
Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.
CVE-2024-0115 2 Canonical, Nvidia 3 Ubuntu Linux, Cv-cuda, Jetpack Software Development Kit 2024-12-26 6.1 Medium
NVIDIA CV-CUDA for Ubuntu 20.04, Ubuntu 22.04, and Jetpack contains a vulnerability in Python APIs where a user may cause an uncontrolled resource consumption issue by a long running CV-CUDA Python process. A successful exploit of this vulnerability may lead to denial of service and data loss.
CVE-2024-56200 2024-12-20 8.6 High
Altair is a fork of Misskey v12. Affected versions lack of request validation and lack of authentication in the image proxy for compressing and resizing remote files could allow attacks that could affect availability, such as by abnormally increasing the CPU usage of the server on which this software is running or placing a heavy load on the network it is using. This issue has been fixed in v12.24Q4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2022-27600 2024-12-20 6.8 Medium
An uncontrolled resource consumption vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2277 and later QTS 4.5.4.2280 build 20230112 and later QuTS hero h5.0.1.2277 build 20230112 and later QuTS hero h4.5.4.2374 build 20230417 and later QuTScloud c5.0.1.2374 and later