Advisories in category 'denial-of-service'
-
INFO RUSTSEC-2025-0027: Unsoundness in mp3-metadata
Panic in mp3-metadata due to the lack of bounds checking
-
RUSTSEC-2025-0015: Vulnerability in web-push
Denial of Service via malicious Web Push endpoint
-
RUSTSEC-2024-0437: Vulnerability in protobuf
Crash due to uncontrolled recursion in protobuf crate
-
RUSTSEC-2025-0009: Vulnerability in ring
Some AES functions may panic when overflow checking is enabled.
-
MEDIUM RUSTSEC-2024-0401: Vulnerability in zlib-rs
Denial of service because of stack overflow with malicious decompression input
-
MEDIUM RUSTSEC-2024-0406: Vulnerability in ic-stable-structures
BTreeMap memory leak when deallocating nodes with overflows
-
RUSTSEC-2024-0405: Vulnerability in rustyscript
op_panic in the base runtime can force a panic in the runtime's containing thread
-
RUSTSEC-2024-0403: Vulnerability in js-sandbox
op_panic in the base runtime can force a panic in the runtime's containing thread
-
RUSTSEC-2024-0399: Vulnerability in rustls
rustls network-reachable panic in
Acceptor::accept
-
RUSTSEC-2024-0376: Vulnerability in tonic
Remotely exploitable Denial of Service in Tonic
-
HIGH RUSTSEC-2024-0373: Vulnerability in quinn-proto
Endpoint::retry()
calls can lead to panicking -
HIGH RUSTSEC-2024-0372: Vulnerability in ic-cdk
Memory leak when calling a canister method via
ic_cdk::call
-
HIGH RUSTSEC-2024-0369: Vulnerability in phonenumber
phonenumber: panic on parsing crafted phonenumber inputs
-
RUSTSEC-2024-0366: Vulnerability in cosmwasm-vm
CWA-2023-004: Excessive number of function parameters in compiled Wasm
-
RUSTSEC-2024-0361: Vulnerability in cosmwasm-vm
CWA-2024-004: Gas mispricing in cosmwasm-vm
-
RUSTSEC-2024-0345: Vulnerability in sequoia-openpgp
Low severity (DoS) vulnerability in sequoia-openpgp
-
HIGH RUSTSEC-2024-0341: Vulnerability in tls-listener
Slow loris vulnerability with default configuration
-
HIGH RUSTSEC-2024-0336: Vulnerability in rustls
rustls::ConnectionCommon::complete_io
could fall into an infinite loop based on network input -
RUSTSEC-2024-0332: Vulnerability in h2
Degradation of service in h2 servers with CONTINUATION Flood
-
RUSTSEC-2023-0085: Vulnerability in hpack
HPACK decoder panics on invalid input
-
RUSTSEC-2024-0020: Vulnerability in whoami
Stack buffer overflow with whoami on several Unix platforms
-
HIGH RUSTSEC-2023-0083: Vulnerability in blurhash
blurhash: panic on parsing crafted blurhash inputs
-
HIGH RUSTSEC-2023-0082: Vulnerability in phonenumber
phonenumber: panic on parsing crafted RF3966 phonenumber inputs
-
RUSTSEC-2024-0011: Vulnerability in snow
Unauthenticated Nonce Increment in snow
-
RUSTSEC-2024-0012: Vulnerability in serde-json-wasm
Stack overflow during recursive JSON parsing
-
HIGH RUSTSEC-2024-0013: Vulnerability in libgit2-sys
Memory corruption, denial of service, and arbitrary code execution in libgit2
-
RUSTSEC-2024-0003: Vulnerability in h2
Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS)
-
RUSTSEC-2023-0077: Vulnerability in rosenpass
Remotely exploitable DoS condition in Rosenpass <=0.2.0
-
HIGH RUSTSEC-2023-0073: Vulnerability in candid
Infinite decoding loop through specially crafted payload
-
HIGH RUSTSEC-2023-0065: Vulnerability in tungstenite
Tungstenite allows remote attackers to cause a denial of service
-
HIGH RUSTSEC-2023-0063: Vulnerability in quinn-proto
Denial of service in Quinn servers
-
HIGH RUSTSEC-2023-0062: Vulnerability in bcder
BER/CER/DER decoder panics on invalid input
-
HIGH RUSTSEC-2023-0052: Vulnerability in webpki
webpki: CPU denial of service in certificate path building
-
HIGH RUSTSEC-2023-0053: Vulnerability in rustls-webpki
rustls-webpki: CPU denial of service in certificate path building
-
RUSTSEC-2023-0041: Vulnerability in trust-dns-server
Remote Attackers can cause Denial-of-Service (packet loops) with crafted DNS packets
-
RUSTSEC-2023-0039: Vulnerability in buffered-reader
Out-of-bounds array access leads to panic
-
RUSTSEC-2023-0038: Vulnerability in sequoia-openpgp
Out-of-bounds array access leads to panic
-
RUSTSEC-2023-0034: Vulnerability in h2
Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS)
-
RUSTSEC-2023-0024: Vulnerability in openssl
openssl
X509Extension::new
andX509Extension::new_nid
null pointer dereference -
HIGH RUSTSEC-2022-0090: Vulnerability in libsqlite3-sys
libsqlite3-sys
via C SQLite CVE-2022-35737 -
RUSTSEC-2023-0011: Vulnerability in openssl-src
Invalid pointer dereference in
d2i_PKCS7
functions -
RUSTSEC-2023-0008: Vulnerability in openssl-src
X.509 Name Constraints Read Buffer Overflow
-
RUSTSEC-2023-0006: Vulnerability in openssl-src
X.400 address type confusion in X.509
GeneralName
-
RUSTSEC-2023-0013: Vulnerability in openssl-src
NULL
dereference during PKCS7 data verification -
RUSTSEC-2023-0009: Vulnerability in openssl-src
Use-after-free following
BIO_new_NDEF
-
RUSTSEC-2023-0010: Vulnerability in openssl-src
Double free after calling
PEM_read_bio_ex
-
RUSTSEC-2023-0012: Vulnerability in openssl-src
NULL
dereference validating DSA public key -
RUSTSEC-2023-0004: Vulnerability in bzip2
bzip2 Denial of Service (DoS)
-
HIGH RUSTSEC-2022-0084: Vulnerability in libp2p
libp2p Lack of resource management DoS
-
HIGH RUSTSEC-2022-0066: Vulnerability in conduit-hyper
Denial of Service from unchecked request length
-
RUSTSEC-2022-0065: Vulnerability in openssl-src
X.509 Email Address Variable Length Buffer Overflow
-
RUSTSEC-2022-0064: Vulnerability in openssl-src
X.509 Email Address 4-byte Buffer Overflow
-
RUSTSEC-2022-0055: Vulnerability in axum-core
No default limit put on request bodies
-
MEDIUM RUSTSEC-2021-0143: Vulnerability in kamadak-exif
kamadak-exif DoS with untrusted PNG data
-
HIGH RUSTSEC-2022-0038: Vulnerability in juniper
Denial of service on deeply nested fragment requests
-
HIGH RUSTSEC-2022-0037: Vulnerability in async-graphql
Denial of service on deeply nested fragment requests
-
RUSTSEC-2022-0035: Vulnerability in websocket
Unbounded memory allocation based on untrusted length
-
RUSTSEC-2022-0030: Vulnerability in rulex
Stack overflow during recursive expression parsing
-
RUSTSEC-2022-0031: Vulnerability in rulex
Panic due to improper UTF-8 indexing
-
HIGH RUSTSEC-2022-0025: Vulnerability in openssl-src
Resource leakage when decoding certificates and keys
-
RUSTSEC-2022-0014: Vulnerability in openssl-src
Infinite loop in
BN_mod_sqrt()
reachable when parsing certificates -
HIGH RUSTSEC-2022-0013: Vulnerability in regex
Regexes with large repetitions on empty sub-expressions take a very long time to parse
-
RUSTSEC-2022-0004: Vulnerability in rustc-serialize
Stack overflow in rustc_serialize when parsing deeply nested JSON
-
RUSTSEC-2021-0129: Vulnerability in openssl-src
Invalid handling of
X509_verify_cert()
internal errors in libssl -
RUSTSEC-2021-0125: Vulnerability in simple_asn1
Panic on incorrect date input to
simple_asn1
-
HIGH RUSTSEC-2021-0098: Vulnerability in openssl-src
Read buffer overruns processing ASN.1 strings
-
RUSTSEC-2021-0089: Vulnerability in raw-cpuid
Optional
Deserialize
implementations lacking validation -
RUSTSEC-2021-0073: Vulnerability in prost-types
Conversion from
prost_types::Timestamp
toSystemTime
can cause an overflow and panic -
RUSTSEC-2021-0066: Vulnerability in evm-core
Denial of service on EVM execution due to memory over-allocation
-
MEDIUM RUSTSEC-2021-0055: Vulnerability in openssl-src
NULL pointer deref in signature_algorithms processing
-
HIGH RUSTSEC-2021-0057: Vulnerability in openssl-src
Integer overflow in CipherUpdate
-
MEDIUM RUSTSEC-2021-0058: Vulnerability in openssl-src
Null pointer deref in
X509_issuer_and_serial_hash()
-
HIGH RUSTSEC-2021-0041: Vulnerability in parse_duration
Denial of service through parsing payloads with too big exponent
-
RUSTSEC-2021-0013: Vulnerability in raw-cpuid
Soundness issues in
raw-cpuid
-
MEDIUM RUSTSEC-2020-0075: Vulnerability in branca
Unexpected panic when decoding tokens
-
HIGH RUSTSEC-2020-0068: Vulnerability in multihash
Unexpected panic in multihash
from_slice
parsing code -
MEDIUM RUSTSEC-2020-0061: Vulnerability in futures-task
futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer
-
HIGH RUSTSEC-2020-0019: Vulnerability in tokio-rustls
tokio-rustls reads may cause excessive memory usage
-
HIGH RUSTSEC-2020-0043: Vulnerability in ws
Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory
-
HIGH RUSTSEC-2020-0015: Vulnerability in openssl-src
Crash causing Denial of Service attack
-
HIGH RUSTSEC-2019-0003: Vulnerability in protobuf
Out of Memory in stream::read_raw_bytes_into()
-
HIGH RUSTSEC-2019-0033: Vulnerability in http
Integer Overflow in HeaderMap::reserve() can cause Denial of Service
-
CRITICAL RUSTSEC-2020-0002: Vulnerability in prost
Parsing a specially crafted message can result in a stack overflow
-
RUSTSEC-2017-0006: Vulnerability in rmpv
Unchecked vector pre-allocation
-
HIGH RUSTSEC-2020-0001: Vulnerability in trust-dns-server
Stack overflow when resolving additional records from MX or SRV null targets
-
CRITICAL CVE-2018-1000810: Vulnerability in std
Buffer overflow vulnerability in str::repeat()
-
CVE-2018-1000657: Vulnerability in std
Buffer overflow vulnerability in VecDeque::reserve()