Total
1413 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-19154 | 1 Htmlcoin | 1 Htmlcoin | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
HTMLCOIN through 2.12 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service. The attacker sends invalid headers/blocks. The attack requires no stake and can fill the victim's disk and RAM. | |||||
CVE-2018-19151 | 1 Qtum | 1 Qtum | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
qtum through 0.16 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service. The attacker sends invalid headers/blocks. The attack requires no stake and can fill the victim's disk and RAM. | |||||
CVE-2018-19159 | 1 Luxcore | 1 Lux | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
lux through 5.2.2 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19155 | 1 Navcoin | 1 Navcoin | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
navcoin through 4.3.0 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service. The attacker sends invalid headers/blocks. The attack requires no stake and can fill the victim's disk and RAM. | |||||
CVE-2018-19160 | 1 Bit.diamonds | 1 Diamond | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Diamond through 3.0.1.2 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19164 | 1 Reddcoin | 1 Reddcoin | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
reddcoin through 2.1.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19158 | 1 Colossusxt | 1 Colossuscoinxt | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
ColossusCoinXT through 1.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19156 | 1 Pivx | 1 Pivx | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
PIVX through 3.1.03 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19163 | 1 Stratisplatform | 1 Stratisx | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
stratisX through 2.0.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19157 | 1 Phore | 1 Phore | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Phore through 1.3.3.1 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19162 | 1 Diviproject | 1 Divi | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Divi through 4.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | |||||
CVE-2018-19153 | 1 Particl | 1 Particl | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
particl through 0.17 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service. The attacker sends invalid headers/blocks. The attack requires no stake and can fill the victim's disk and RAM. | |||||
CVE-2018-17189 | 7 Apache, Canonical, Debian and 4 more | 13 Http Server, Ubuntu Linux, Debian Linux and 10 more | 2023-11-07 | 5.0 MEDIUM | 5.3 MEDIUM |
In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections. | |||||
CVE-2018-16878 | 6 Canonical, Clusterlabs, Debian and 3 more | 9 Ubuntu Linux, Pacemaker, Debian Linux and 6 more | 2023-11-07 | 2.1 LOW | 5.5 MEDIUM |
A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS | |||||
CVE-2018-16470 | 1 Rack Project | 1 Rack | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size. | |||||
CVE-2018-16131 | 1 Lightbend | 1 Akka Http | 2023-11-07 | 7.8 HIGH | 7.5 HIGH |
The decodeRequest and decodeRequestWith directives in Lightbend Akka HTTP 10.1.x through 10.1.4 and 10.0.x through 10.0.13 allow remote attackers to cause a denial of service (memory consumption and daemon crash) via a ZIP bomb. | |||||
CVE-2017-7670 | 1 Apache | 1 Traffic Control | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
The Traffic Router component of the incubating Apache Traffic Control project is vulnerable to a Slowloris style Denial of Service attack. TCP connections made on the configured DNS port will remain in the ESTABLISHED state until the client explicitly closes the connection or Traffic Router is restarted. If connections remain in the ESTABLISHED state indefinitely and accumulate in number to match the size of the thread pool dedicated to processing DNS requests, the thread pool becomes exhausted. Once the thread pool is exhausted, Traffic Router is unable to service any DNS request, regardless of transport protocol. | |||||
CVE-2017-9104 | 3 Fedoraproject, Gnu, Opensuse | 3 Fedora, Adns, Leap | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered. | |||||
CVE-2017-5637 | 2 Apache, Debian | 2 Zookeeper, Debian Linux | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later. | |||||
CVE-2017-16137 | 1 Debug Project | 1 Debug | 2023-11-07 | 5.0 MEDIUM | 5.3 MEDIUM |
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue. |