Vulnerabilities (CVE)

Filtered by CWE-400
Total 1574 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-45802 2 Apache, Fedoraproject 2 Http Server, Fedora 2024-06-10 N/A 5.9 MEDIUM
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
CVE-2024-27310 2024-06-07 N/A 5.3 MEDIUM
Zoho ManageEngine ADSelfService Plus versions below 6401 are vulnerable to the DOS attack due to the malicious LDAP query.
CVE-2022-30858 1 Miniupnp Project 1 Ngiflib 2024-06-06 N/A 6.5 MEDIUM
An issue was discovered in ngiflib 0.4. There is SEGV in SDL_LoadAnimatedGif when use SDLaffgif. poc : ./SDLaffgif CA_file2_0
CVE-2024-4148 2024-06-03 N/A 7.5 HIGH
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary application, version 1.2.10. An attacker can exploit this vulnerability by maliciously manipulating regular expressions, which can significantly impact the response time of the application and potentially render it completely non-functional. Specifically, the vulnerability can be triggered by sending a specially crafted request to the application, leading to a denial of service where the application crashes.
CVE-2024-35221 2024-05-30 N/A 4.3 MEDIUM
Rubygems.org is the Ruby community's gem hosting service. A Gem publisher can cause a Remote DoS when publishing a Gem. This is due to how Ruby reads the Manifest of Gem files when using Gem::Specification.from_yaml. from_yaml makes use of SafeYAML.load which allows YAML aliases inside the YAML-based metadata of a gem. YAML aliases allow for Denial of Service attacks with so-called `YAML-bombs` (comparable to Billion laughs attacks). This was patched. There is is no action required by users. This issue is also tracked as GHSL-2024-001 and was discovered by the GitHub security lab.
CVE-2024-1402 1 Mattermost 1 Mattermost Server 2024-05-30 N/A 4.3 MEDIUM
Mattermost fails to check if a custom emoji reaction exists when sending it to a post and to limit the amount of custom emojis allowed to be added in a post, allowing an attacker sending a huge amount of non-existent custom emojis in a post to crash the mobile app of a user seeing the post and to crash the server due to overloading when clients attempt to retrive the aforementioned post. 
CVE-2024-4438 2024-05-30 N/A 7.5 HIGH
The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2023-39325/CVE-2023-44487, known as Rapid Reset. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.
CVE-2024-4437 2024-05-30 N/A 7.5 HIGH
The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2021-44716. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.
CVE-2024-4436 2024-05-30 N/A 7.5 HIGH
The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2022-41723. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.
CVE-2023-24862 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-05-29 N/A 5.5 MEDIUM
Windows Secure Channel Denial of Service Vulnerability
CVE-2023-23396 1 Microsoft 2 Office Online Server, Office Web Apps Server 2024-05-29 N/A 6.5 MEDIUM
Microsoft Excel Denial of Service Vulnerability
CVE-2023-38162 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2024-05-29 N/A 7.5 HIGH
DHCP Server Service Denial of Service Vulnerability
CVE-2023-38149 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-05-29 N/A 7.5 HIGH
Windows TCP/IP Denial of Service Vulnerability
CVE-2023-36799 1 Microsoft 2 .net, Visual Studio 2022 2024-05-29 N/A 6.5 MEDIUM
.NET Core and Visual Studio Denial of Service Vulnerability
CVE-2023-35339 1 Microsoft 10 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 7 more 2024-05-29 N/A 7.5 HIGH
Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-35329 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2024-05-29 N/A 6.5 MEDIUM
Windows Authentication Denial of Service Vulnerability
CVE-2023-35298 1 Microsoft 3 Windows 11 21h2, Windows 11 22h2, Windows Server 2022 2024-05-29 N/A 7.5 HIGH
HTTP.sys Denial of Service Vulnerability
CVE-2023-21728 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 12 more 2024-05-29 N/A 7.5 HIGH
Windows Netlogon Denial of Service Vulnerability
CVE-2023-21557 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 12 more 2024-05-29 N/A 7.5 HIGH
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2023-21547 1 Microsoft 9 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 6 more 2024-05-29 N/A 7.5 HIGH
Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability