Vulnerabilities > Allocation of Resources Without Limits or Throttling
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-29 | CVE-2024-23826 | Allocation of Resources Without Limits or Throttling vulnerability in Se.Math.Spbu Spbu SE Site spbu_se_site is the website of the Department of System Programming of St. | 5.7 |
2024-01-12 | CVE-2024-21655 | Allocation of Resources Without Limits or Throttling vulnerability in Discourse Discourse is a platform for community discussion. | 4.3 |
2024-01-12 | CVE-2024-21604 | Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos OS Evolved An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If a high rate of specific valid packets are processed by the routing engine (RE) this will lead to a loss of connectivity of the RE with other components of the chassis and thereby a complete and persistent system outage. | 7.5 |
2024-01-09 | CVE-2023-6476 | Allocation of Resources Without Limits or Throttling vulnerability in Redhat Openshift Container Platform 3.11/4.13/4.14 A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. | 7.5 |
2024-01-09 | CVE-2024-22164 | Allocation of Resources Without Limits or Throttling vulnerability in Splunk Enterprise Security 7.1.0/7.1.1 In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. | 4.3 |
2024-01-04 | CVE-2024-0241 | Allocation of Resources Without Limits or Throttling vulnerability in Diaconou Encodedid::Rails encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. | 7.5 |
2023-12-27 | CVE-2023-3171 | Allocation of Resources Without Limits or Throttling vulnerability in Redhat Jboss Enterprise Application Platform 7.4 A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. | 7.5 |
2023-12-14 | CVE-2023-6563 | Allocation of Resources Without Limits or Throttling vulnerability in Redhat products An unconstrained memory consumption vulnerability was discovered in Keycloak. | 7.7 |
2023-12-12 | CVE-2023-5379 | Allocation of Resources Without Limits or Throttling vulnerability in Redhat products A flaw was found in Undertow. | 7.5 |
2023-12-10 | CVE-2023-50455 | Allocation of Resources Without Limits or Throttling vulnerability in Zammad 6.1.0/6.2.0 An issue was discovered in Zammad before 6.2.0. | 7.5 |