Vulnerabilities > Allocation of Resources Without Limits or Throttling
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-04-19 | CVE-2024-31992 | Allocation of Resources Without Limits or Throttling vulnerability in Mealie Mealie is a self hosted recipe manager and meal planner. | 6.5 |
2024-04-15 | CVE-2024-32035 | Allocation of Resources Without Limits or Throttling vulnerability in Sixlabors Imagesharp ImageSharp is a 2D graphics API. | 6.5 |
2024-04-10 | CVE-2024-29902 | Allocation of Resources Without Limits or Throttling vulnerability in Sigstore Cosign Cosign provides code signing and transparency for containers and binaries. | 5.9 |
2024-04-10 | CVE-2024-29903 | Allocation of Resources Without Limits or Throttling vulnerability in Sigstore Cosign Cosign provides code signing and transparency for containers and binaries. | 7.5 |
2024-04-10 | CVE-2021-47182 | Allocation of Resources Without Limits or Throttling vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix scsi_mode_sense() buffer length handling Several problems exist with scsi_mode_sense() buffer length handling: 1) The allocation length field of the MODE SENSE(10) command is 16-bits, occupying bytes 7 and 8 of the CDB. | 5.5 |
2024-04-10 | CVE-2024-26816 | Allocation of Resources Without Limits or Throttling vulnerability in multiple products In the Linux kernel, the following vulnerability has been resolved: x86, relocs: Ignore relocations in .notes section When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the "startup_xen" entry point. This information is used prior to booting the kernel, so relocations are not useful. | 5.5 |
2024-04-05 | CVE-2024-28949 | Allocation of Resources Without Limits or Throttling vulnerability in Mattermost Server Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don't limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service. | 6.5 |
2024-04-04 | CVE-2024-27268 | Allocation of Resources Without Limits or Throttling vulnerability in IBM Websphere Application Server IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. | 7.5 |
2024-04-04 | CVE-2024-26798 | Allocation of Resources Without Limits or Throttling vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: fbcon: always restore the old font data in fbcon_do_set_font() Commit a5a923038d70 (fbdev: fbcon: Properly revert changes when vc_resize() failed) started restoring old font data upon failure (of vc_resize()). | 5.5 |
2024-04-03 | CVE-2024-28870 | Allocation of Resources Without Limits or Throttling vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community. | 7.5 |