Security
Headlines
HeadlinesLatestCVEs

Tag

#dos

RHSA-2022:0582: Red Hat Security Advisory: ruby:2.6 security update

An update for the ruby:2.6 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-15845: ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? * CVE-2019-16201: ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication * CVE-2019-16254: ruby: HTTP response splitting in WEBrick * CVE-2019-16255: ruby: Code injection via command argument of Shell#tes...

Red Hat Security Data
#sql#vulnerability#web#linux#red_hat#dos#js
RHSA-2022:0581: Red Hat Security Advisory: ruby:2.6 security update

An update for the ruby:2.6 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-15845: ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? * CVE-2019-16201: ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication * CVE-2019-16254: ruby: HTTP response splitting in WEBrick * CVE-2019-16255: ruby: Code injection via command argument of...

CVE-2016-20013

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

CVE-2021-23702: Prototype Pollution in object-extend | CVE-2021-23702 | Snyk

The package object-extend from 0.0.0 are vulnerable to Prototype Pollution via object-extend.

CVE-2021-46082: MGate 5109 and MGate 5101-PBM-MN Series Protocol Gateways Vulnerability

Moxa TN-5900 v3.1 series routers, MGate 5109 v2.2 series protocol gateways, and MGate 5101-PBM-MN v2.1 series protocol gateways were discovered to contain a memory leak which allows attackers to cause a Denial of Service (DoS) via crafted packets.

CVE-2022-0585: 2022/CVE-2022-0585.json · master · GitLab.org / cves · GitLab

Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file

CVE-2021-3930: Invalid Bug ID

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

CVE-2020-25722: Samba - Security Announcement Archive

Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.

CVE-2022-0585: 2022/CVE-2022-0585.json · master · GitLab.org / cves

Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file

CVE-2021-3930: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.