Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-1150

Summary
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
Published At-26 Jun, 2023 | 06:19
Updated At-05 Dec, 2024 | 19:07
Rejected At-
Credits

WAGO: Series 750-3x/-8x prone to MODBUS server DoS

Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CERTVDE
Assigner Org ID:270ccfa6-a436-4e77-922e-914ec3a9685c
Published At:26 Jun, 2023 | 06:19
Updated At:05 Dec, 2024 | 19:07
Rejected At:
▼CVE Numbering Authority (CNA)
WAGO: Series 750-3x/-8x prone to MODBUS server DoS

Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.

Affected Products
Vendor
WAGO
Product
750-332
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-362/xxx-xxx
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-363/xxx-xxx
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-364/xxx-xxx
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-365/xxx-xxx
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-823
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-832/xxx-xxx
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-862
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-890/xxx-xxx
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-891
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Vendor
WAGO
Product
750-893
Default Status
unaffected
Versions
Affected
  • From 0 through FW10 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-772CWE-772 Missing Release of Resource after Effective Lifetime
Type: CWE
CWE ID: CWE-772
Description: CWE-772 Missing Release of Resource after Effective Lifetime
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Roman Ezhov from Kaspersky
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en/advisories/VDE-2023-005/
N/A
Hyperlink: https://cert.vde.com/en/advisories/VDE-2023-005/
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en/advisories/VDE-2023-005/
x_transferred
Hyperlink: https://cert.vde.com/en/advisories/VDE-2023-005/
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:info@cert.vde.com
Published At:26 Jun, 2023 | 07:15
Updated At:02 Oct, 2024 | 06:15

Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

wago
wago
>>750-363\/040-000>>-
cpe:2.3:h:wago:750-363\/040-000:-:*:*:*:*:*:*:*
wago
wago
>>750-363\/040-000_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-363\/040-000_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-362\/040-000>>-
cpe:2.3:h:wago:750-362\/040-000:-:*:*:*:*:*:*:*
wago
wago
>>750-362\/040-000_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-362\/040-000_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-362\/000-001>>-
cpe:2.3:h:wago:750-362\/000-001:-:*:*:*:*:*:*:*
wago
wago
>>750-362\/000-001_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-362\/000-001_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-891>>-
cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*
wago
wago
>>750-891_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-365\/040-010>>-
cpe:2.3:h:wago:750-365\/040-010:-:*:*:*:*:*:*:*
wago
wago
>>750-365\/040-010_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-365\/040-010_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-364\/040-010>>-
cpe:2.3:h:wago:750-364\/040-010:-:*:*:*:*:*:*:*
wago
wago
>>750-364\/040-010_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-364\/040-010_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-362>>-
cpe:2.3:h:wago:750-362:-:*:*:*:*:*:*:*
wago
wago
>>750-362_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-362_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-363>>-
cpe:2.3:h:wago:750-363:-:*:*:*:*:*:*:*
wago
wago
>>750-363_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-363_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-823_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-823>>-
cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*
wago
wago
>>750-832_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-832>>-
cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*
wago
wago
>>750-832\/000-002_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-832\/000-002_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-832\/000-002>>-
cpe:2.3:h:wago:750-832\/000-002:-:*:*:*:*:*:*:*
wago
wago
>>750-862_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-862>>-
cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*
wago
wago
>>750-890_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-890>>-
cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*
wago
wago
>>750-890\/025-000_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-890\/025-000_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-890\/025-000>>-
cpe:2.3:h:wago:750-890\/025-000:-:*:*:*:*:*:*:*
wago
wago
>>750-890\/025-001_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-890\/025-001_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-890\/025-001>>-
cpe:2.3:h:wago:750-890\/025-001:-:*:*:*:*:*:*:*
wago
wago
>>750-890\/025-002_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-890\/025-002_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-890\/025-002>>-
cpe:2.3:h:wago:750-890\/025-002:-:*:*:*:*:*:*:*
wago
wago
>>750-890\/040-000_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-890\/040-000_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-890\/040-000>>-
cpe:2.3:h:wago:750-890\/040-000:-:*:*:*:*:*:*:*
wago
wago
>>750-893_firmware>>Versions before fw11(exclusive)
cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-893>>-
cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-772Primaryinfo@cert.vde.com
CWE ID: CWE-772
Type: Primary
Source: info@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert.vde.com/en/advisories/VDE-2023-005/info@cert.vde.com
Third Party Advisory
Hyperlink: https://cert.vde.com/en/advisories/VDE-2023-005/
Source: info@cert.vde.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

66Records found

CVE-2021-21002
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.33% / 56.26%
||
7 Day CHG~0.00%
Published-25 Jun, 2021 | 18:25
Updated-17 Sep, 2024 | 03:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of Service in Phoenix Contact FL COMSERVER UNI products

In Phoenix Contact FL COMSERVER UNI in versions < 2.40 a invalid Modbus exception response can lead to a temporary denial of service.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-fl_comserver_uni_232\/422\/485-t_firmwarefl_comserver_uni_232\/422\/485-tfl_comserver_uni_232\/422\/485_firmwarefl_comserver_uni_232\/422\/485FL COMSERVER
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2025-24120
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.86%
||
7 Day CHG~0.00%
Published-27 Jan, 2025 | 21:46
Updated-02 Apr, 2026 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed by improved management of object lifetimes. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An attacker may be able to cause unexpected app termination.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2020-9375
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-28.04% / 96.51%
||
7 Day CHG~0.00%
Published-25 Mar, 2020 | 14:17
Updated-05 Mar, 2026 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-archer_c50archer_c5n/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-8309
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.11% / 78.22%
||
7 Day CHG~0.00%
Published-23 May, 2017 | 03:56
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.

Action-Not Available
Vendor-n/aQEMUDebian GNU/LinuxRed Hat, Inc.
Product-qemudebian_linuxopenstackn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2016-0877
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.72% / 72.63%
||
7 Day CHG~0.00%
Published-31 May, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-edr-g903_firmwareedr-g903n/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-5507
Matching Score-4
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-4
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-11.40% / 93.63%
||
7 Day CHG~0.00%
Published-24 Mar, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-18675
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.45%
||
7 Day CHG~0.00%
Published-07 Apr, 2020 | 14:37
Updated-05 Aug, 2024 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with M(6.0) and N(7.x) (Exynos7420 or Exynox8890 chipsets) software. The Camera application can leak uninitialized memory via ion. The Samsung ID is SVE-2016-6989 (April 2017).

Action-Not Available
Vendor-n/aGoogle LLCSamsung
Product-androidexynox_8890exynos_7420n/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2024-21789
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.11%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 16:30
Updated-24 Apr, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BIG-IP ASM and Advanced WAF vulnerability

When a BIG-IP ASM/Advanced WAF security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Action-Not Available
Vendor-F5, Inc.
Product-big-ip_advanced_web_application_firewallbig-ip_application_security_managerBIG-IPbig-ip
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2022-26353
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.90%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:02
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0.

Action-Not Available
Vendor-n/aQEMUDebian GNU/Linux
Product-debian_linuxqemuqemu-kvm
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-13748
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.66% / 85.89%
||
7 Day CHG~0.00%
Published-29 Aug, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There are lots of memory leaks in JasPer 2.0.12, triggered in the function jas_strdup() in base/jas_string.c, that will lead to a remote denial of service attack.

Action-Not Available
Vendor-n/aDebian GNU/LinuxJasPerFedora Project
Product-fedoradebian_linuxjaspern/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2025-27421
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.07%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 16:19
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Goroutine Leak in Abacus SSE Implementation

Abacus is a highly scalable and stateless counting API. A critical goroutine leak vulnerability has been identified in the Abacus server's Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the /stream endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server continues running but eventually stops accepting new SSE connections while maintaining high memory usage. The vulnerability specifically involves improper channel cleanup in the event handling mechanism, causing goroutines to remain blocked indefinitely. This vulnerability is fixed in 1.4.0.

Action-Not Available
Vendor-JasonLovesDoggo
Product-abacus
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2019-19956
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.58%
||
7 Day CHG~0.00%
Published-24 Dec, 2019 | 15:12
Updated-03 Dec, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.

Action-Not Available
Vendor-n/aOracle CorporationNetApp, Inc.Canonical Ltd.Fedora ProjectDebian GNU/Linuxlibxml2 (XMLSoft)Siemens AG
Product-libxml2ubuntu_linuxclustered_data_ontapfedoraclustered_data_ontap_antivirus_connectordebian_linuxsteelstore_cloud_integrated_storagemanageability_software_development_kitontap_select_deploy_administration_utilitysinema_remote_connect_serveractive_iq_unified_managerreal_user_experience_insightn/a
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2021-42859
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.79%
||
7 Day CHG~0.00%
Published-26 May, 2022 | 11:02
Updated-04 Aug, 2024 | 04:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory leak issue was discovered in Mini-XML v3.2 that could cause a denial of service. NOTE: testing reports are inconsistent, with some testers seeing the issue in both the 3.2 release and in the October 2021 development code, but others not seeing the issue in the 3.2 release

Action-Not Available
Vendor-mini-xml_projectn/a
Product-mini-xmln/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2021-42075
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.89% / 75.64%
||
7 Day CHG~0.00%
Published-08 Nov, 2021 | 03:55
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Barrier before 2.3.4. The barriers component (aka the server-side implementation of Barrier) does not correctly close file descriptors for established TCP connections. An unauthenticated remote attacker can thus cause file descriptor exhaustion in the server process, leading to denial of service.

Action-Not Available
Vendor-barrier_projectn/a
Product-barriern/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2021-42340
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-4.28% / 88.92%
||
7 Day CHG~0.00%
Published-14 Oct, 2021 | 19:55
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DoS via memory leak with WebSocket connections

The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.

Action-Not Available
Vendor-The Apache Software FoundationNetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-communications_diameter_signaling_routerretail_store_inventory_managementhospitality_cruise_shipboard_property_management_systemtaleo_platformsd-wan_edgeretail_customer_insightshciretail_data_extractor_for_merchandisingretail_financial_integrationretail_eftlinkagile_engineering_data_managementmanagement_services_for_element_softwaredebian_linuxmiddleware_common_libraries_and_toolstomcatpayment_interfacebig_data_spatial_and_graphmanaged_file_transferApache Tomcat
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2022-29884
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.5||HIGH
EPSS-1.39% / 80.52%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 10:06
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < CPC80 V16.30), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < CPC80 V16.30), CP-8021 MASTER MODULE (All versions < CPC80 V16.30), CP-8022 MASTER MODULE WITH GPRS (All versions < CPC80 V16.30). When using the HTTPS server under specific conditions, affected devices do not properly free resources. This could allow an unauthenticated remote attacker to put the device into a denial of service condition.

Action-Not Available
Vendor-Siemens AG
Product-sicam_a8000_cp-8000sicam_a8000_cp-8021_firmwaresicam_a8000_cp-8022sicam_a8000_cp-8000_firmwaresicam_a8000_cp-8021sicam_a8000_cp-8022_firmwareCP-8022 MASTER MODULE WITH GPRSCP-8021 MASTER MODULECP-8000 MASTER MODULE WITH I/O -25/+70°CCP-8000 MASTER MODULE WITH I/O -40/+70°C
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
  • Previous
  • 1
  • 2
  • Next
Details not found