Vulnerabilities > Allocation of Resources Without Limits or Throttling

DATE CVE VULNERABILITY TITLE RISK
2022-03-31 CVE-2021-43662 Allocation of Resources Without Limits or Throttling vulnerability in Totolink A720R Firmware and Ex300 V2 Firmware
totolink EX300_v2, ver V4.0.3c.140_B20210429 and A720R ,ver V4.1.5cu.470_B20200911 have an issue which causes uncontrolled resource consumption.
low complexity
totolink CWE-770
6.5
2022-03-28 CVE-2017-20016 Allocation of Resources Without Limits or Throttling vulnerability in Weka Interest Security Scanner 1.8
A vulnerability has been found in WEKA INTEREST Security Scanner up to 1.8 and classified as problematic.
network
low complexity
weka CWE-770
7.5
2022-03-11 CVE-2021-32476 Allocation of Resources Without Limits or Throttling vulnerability in Moodle
A denial-of-service risk was identified in the draft files area, due to it not respecting user file upload limits.
network
low complexity
moodle CWE-770
7.5
2022-03-09 CVE-2022-24741 Allocation of Resources Without Limits or Throttling vulnerability in Nextcloud Server
Nextcloud server is an open source, self hosted cloud style services platform.
network
low complexity
nextcloud CWE-770
6.5
2022-03-03 CVE-2022-21716 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
Twisted is an event-based framework for internet applications, supporting Python 3.6+.
network
low complexity
twisted debian oracle fedoraproject CWE-770
7.5
2022-02-28 CVE-2022-24685 Allocation of Resources Without Limits or Throttling vulnerability in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise 1.0.17, 1.1.11, and 1.2.5 allow invalid HCL for the jobs parse endpoint, which may cause excessive CPU usage.
network
low complexity
hashicorp CWE-770
7.5
2022-02-24 CVE-2022-24614 Allocation of Resources Without Limits or Throttling vulnerability in Metadata-Extractor Project Metadata-Extractor
When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs.
local
low complexity
metadata-extractor-project CWE-770
5.5
2022-02-19 CVE-2016-20013 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
7.5
2022-02-18 CVE-2022-23228 Allocation of Resources Without Limits or Throttling vulnerability in Pexip Infinity
Pexip Infinity before 27.0 has improper WebRTC input validation.
network
low complexity
pexip CWE-770
7.5
2022-02-16 CVE-2021-22050 Allocation of Resources Without Limits or Throttling vulnerability in VMWare Esxi 6.5/6.7
ESXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy.
network
low complexity
vmware CWE-770
7.5