Vulnerabilities > Allocation of Resources Without Limits or Throttling

DATE CVE VULNERABILITY TITLE RISK
2024-04-19 CVE-2024-31992 Allocation of Resources Without Limits or Throttling vulnerability in Mealie
Mealie is a self hosted recipe manager and meal planner.
network
low complexity
mealie CWE-770
6.5
2024-04-15 CVE-2024-32035 Allocation of Resources Without Limits or Throttling vulnerability in Sixlabors Imagesharp
ImageSharp is a 2D graphics API.
network
low complexity
sixlabors CWE-770
6.5
2024-04-10 CVE-2024-29902 Allocation of Resources Without Limits or Throttling vulnerability in Sigstore Cosign
Cosign provides code signing and transparency for containers and binaries.
network
high complexity
sigstore CWE-770
5.9
2024-04-10 CVE-2024-29903 Allocation of Resources Without Limits or Throttling vulnerability in Sigstore Cosign
Cosign provides code signing and transparency for containers and binaries.
network
low complexity
sigstore CWE-770
7.5
2024-04-10 CVE-2021-47182 Allocation of Resources Without Limits or Throttling vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix scsi_mode_sense() buffer length handling Several problems exist with scsi_mode_sense() buffer length handling: 1) The allocation length field of the MODE SENSE(10) command is 16-bits, occupying bytes 7 and 8 of the CDB.
local
low complexity
linux CWE-770
5.5
2024-04-10 CVE-2024-26816 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: x86, relocs: Ignore relocations in .notes section When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the "startup_xen" entry point. This information is used prior to booting the kernel, so relocations are not useful.
local
low complexity
linux debian CWE-770
5.5
2024-04-05 CVE-2024-28949 Allocation of Resources Without Limits or Throttling vulnerability in Mattermost Server
Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don't limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service.
network
low complexity
mattermost CWE-770
6.5
2024-04-04 CVE-2024-27268 Allocation of Resources Without Limits or Throttling vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request.
network
low complexity
ibm CWE-770
7.5
2024-04-04 CVE-2024-26798 Allocation of Resources Without Limits or Throttling vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: fbcon: always restore the old font data in fbcon_do_set_font() Commit a5a923038d70 (fbdev: fbcon: Properly revert changes when vc_resize() failed) started restoring old font data upon failure (of vc_resize()).
local
low complexity
linux CWE-770
5.5
2024-04-03 CVE-2024-28870 Allocation of Resources Without Limits or Throttling vulnerability in Oisf Suricata
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
network
low complexity
oisf CWE-770
7.5