Security
Headlines
HeadlinesLatestCVEs

Tag

#dos

CVE-2021-46531: SEGV (/usr/local/bin/mjs+0x8d28e) · Issue #211 · cesanta/mjs

Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8d28e. This vulnerability can lead to a Denial of Service (DoS).

CVE
#vulnerability#dos#js#git
CVE-2021-46530: SEGV src/mjs_exec.c:823 in mjs_execute · Issue #206 · cesanta/mjs

Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_execute at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).

CVE-2021-46529: SEGV (/usr/local/bin/mjs+0x8814e) · Issue #210 · cesanta/mjs

Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8814e. This vulnerability can lead to a Denial of Service (DoS).

CVE-2021-46512: SEGV src/mjs_exec.c:1155 in mjs_apply · Issue #202 · cesanta/mjs

Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_apply at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).

CVE-2021-46516: SEGV mjs/src/mjs_core.c:348:13 in mjs_stack_size · Issue #201 · cesanta/mjs

Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS).

CVE-2021-46528: SEGV (/usr/local/bin/mjs+0x5361e) · Issue #208 · cesanta/mjs

Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x5361e. This vulnerability can lead to a Denial of Service (DoS).

Fetch Softworks Fetch FTP Client 5.8 Remote CPU Consumption (Denial of Service)

The application is prone to a DoS after receiving a long server response (more than 2K bytes) leading to 100% CPU consumption.

CVE-2021-29846: Security Bulletin: IBM Security Guardium Insights is affected by multiple vulnerabilities

IBM Security Guardium Insights 3.0 could allow an authenticated user to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 205256.

CVE-2022-23968: CVE-2022-23968: Xerox vulnerability allows unauthenticated users to remotely brick network printers

Xerox VersaLink devices through 2022-01-24 allow remote attackers to brick the device via a crafted TIFF file in an unauthenticated HTTP POST request. There is a permanent denial of service because image parsing causes a reboot, but image parsing is restarted as soon as the boot process finishes. However, this boot loop can be resolved by a field technician. The TIFF file must have an incomplete Image Directory. Affected firmware versions include xx.42.01 and xx.50.61.

CVE-2021-36348: DSA-2021-259: Dell EMC iDRAC Security Update for Multiple Security Vulnerabilities

iDRAC9 versions prior to 5.00.20.00 contain an input injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to iDRAC.