Vulnerabilities (CVE)

Filtered by CWE-400
Total 1937 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-36799 1 Microsoft 2 .net, Visual Studio 2022 2024-11-21 N/A 6.5 MEDIUM
.NET Core and Visual Studio Denial of Service Vulnerability
CVE-2023-36703 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2024-11-21 N/A 7.5 HIGH
DHCP Server Service Denial of Service Vulnerability
CVE-2023-36478 3 Debian, Eclipse, Jenkins 3 Debian Linux, Jetty, Jenkins 2024-11-21 N/A 7.5 HIGH
Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.
CVE-2023-36435 1 Microsoft 4 .net, Windows 11 21h2, Windows 11 22h2 and 1 more 2024-11-21 N/A 7.5 HIGH
Microsoft QUIC Denial of Service Vulnerability
CVE-2023-36161 1 Quboworld 2 Smart Plug 10a, Smart Plug 10a Firmware 2024-11-21 N/A 7.5 HIGH
An issue was discovered in Qubo Smart Plug 10A version HSP02_01_01_14_SYSTEM-10A, allows attackers to cause a denial of service (DoS) via Wi-Fi deauthentication.
CVE-2023-36042 1 Microsoft 2 Visual Studio 2019, Visual Studio 2022 2024-11-21 N/A 6.2 MEDIUM
Visual Studio Denial of Service Vulnerability
CVE-2023-36038 1 Microsoft 3 .net, Asp.net Core, Visual Studio 2022 2024-11-21 N/A 8.2 HIGH
ASP.NET Core Denial of Service Vulnerability
CVE-2023-35925 1 Intellectualsites 1 Fastasyncworldedit 2024-11-21 N/A 6.2 MEDIUM
FastAsyncWorldEdit (FAWE) is designed for efficient world editing. This vulnerability enables the attacker to select a region with the `Infinity` keyword (case-sensitive!) and executes any operation. This has a possibility of bringing the performing server down. This issue has been fixed in version 2.6.3.
CVE-2023-35909 1 Ninjaforms 1 Ninja Forms 2024-11-21 N/A 5.3 MEDIUM
Uncontrolled Resource Consumption vulnerability in Saturday Drive Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress leading to DoS.This issue affects Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress: from n/a through 3.6.25.
CVE-2023-35767 1 Perforce 1 Helix Core 2024-11-21 N/A 7.5 HIGH
In Helix Core versions prior to 2023.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. Reported by Jason Geffner.  
CVE-2023-35339 1 Microsoft 10 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 7 more 2024-11-21 N/A 7.5 HIGH
Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-35329 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2024-11-21 N/A 6.5 MEDIUM
Windows Authentication Denial of Service Vulnerability
CVE-2023-35298 1 Microsoft 3 Windows 11 21h2, Windows 11 22h2, Windows Server 2022 2024-11-21 N/A 7.5 HIGH
HTTP.sys Denial of Service Vulnerability
CVE-2023-34462 1 Netty 1 Netty 2024-11-21 N/A 6.5 MEDIUM
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final.
CVE-2023-34109 1 Zxcvbn-ts Project 1 Zxcvbn-ts 2024-11-21 N/A 6.5 MEDIUM
zxcvbn-ts is an open source password strength estimator written in typescript. This vulnerability affects users running on the nodeJS platform which are using the second argument of the zxcvbn function. It can result in an unbounded resource consumption as the user inputs array is extended with every function call. Browsers are impacted, too but a single user need to do a lot of input changes so that it affects the browser, while the node process gets the inputs of every user of a platform and can be killed that way. This problem has been patched in version 3.0.2. Users are advised to upgrade. Users unable to upgrade should stop using the second argument of the zxcvbn function and use the zxcvbnOptions.setOptions function.
CVE-2023-34061 1 Pivotal 2 Cloud Foundry Deployment, Cloud Foundry Routing Release 2024-11-21 N/A 7.5 HIGH
Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
CVE-2023-33958 1 Notaryproject 1 Notation-go 2024-11-21 N/A 5.4 MEDIUM
notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry and added a high number of signatures to an artifact can cause denial of service of services on the machine, if a user runs notation verify command on the same machine. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
CVE-2023-33957 1 Notaryproject 1 Notation-go 2024-11-21 N/A 2.6 LOW
notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry and added a high number of signatures to an artifact can cause denial of service of services on the machine, if a user runs notation inspect command on the same machine. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above. Users are advised to upgrade. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
CVE-2023-33141 1 Microsoft 1 Yet Another Reverse Proxy 2024-11-21 N/A 7.5 HIGH
Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability
CVE-2023-33026 1 Qualcomm 390 Ar8035, Ar8035 Firmware, Ar9380 and 387 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in WLAN Firmware while parsing a NAN management frame.