![]() ![]() That is, for example, the case when the pypdf-user manipulates an incoming malicious PDF e.g. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. ![]() An attacker who uses a vulnerability present in versions 3.7.0 through 3.16.4 can craft a PDF which leads to an infinite loop. Pypdf is a free and open-source pure-python PDF library. Insufficient Verification of Data Authenticity vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules and MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to reset the memory of the products to factory default state and cause denial-of-service (DoS) condition on the products by sending specific packets. This resulted in no speculative execution workarounds being installed on CPU 0. On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This could be used by a malicious actor to perform denial of service type attack. ![]() In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |