Vulnerabilities > Uncontrolled Resource Consumption ('Resource Exhaustion')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-07 | CVE-2017-16111 | Resource Exhaustion vulnerability in Content Project Content The content module is a module to parse HTTP Content-* headers. | 7.5 |
2018-06-07 | CVE-2017-16099 | Resource Exhaustion vulnerability in No-Case Project No-Case The no-case module is vulnerable to regular expression denial of service. | 7.5 |
2018-06-07 | CVE-2017-16098 | Resource Exhaustion vulnerability in Charset Project Charset charset 1.0.0 and below are vulnerable to regular expression denial of service. | 7.5 |
2018-06-07 | CVE-2017-16086 | Resource Exhaustion vulnerability in Ua-Parser Project Ua-Parser ua-parser is a port of Browserscope's user agent parser. | 7.5 |
2018-06-01 | CVE-2017-6153 | Resource Exhaustion vulnerability in F5 products Features in F5 BIG-IP 13.0.0-13.1.0.3, 12.1.0-12.1.3.1, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1 system that utilizes inflate functionality directly, via an iRule, or via the inflate code from PEM module are subjected to a service disruption via a "Zip Bomb" attack. | 5.3 |
2018-05-31 | CVE-2016-10524 | Resource Exhaustion vulnerability in I18N-Node-Angular Project I18N-Node-Angular i18n-node-angular is a module used to interact between i18n and angular without using additional resources. | 8.2 |
2018-05-25 | CVE-2018-6237 | Resource Exhaustion vulnerability in Trendmicro Smart Protection Server A vulnerability in Trend Micro Smart Protection Server (Standalone) 3.x could allow an unauthenticated remote attacker to manipulate the product to send a large number of specially crafted HTTP requests to potentially cause the file system to fill up, eventually causing a denial of service (DoS) situation. | 7.5 |
2018-05-11 | CVE-2016-8627 | Resource Exhaustion vulnerability in Redhat Jboss Enterprise Application Platform and Keycloak admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. | 6.5 |
2018-05-09 | CVE-2018-10827 | Resource Exhaustion vulnerability in Litecart LiteCart before 2.1.2 allows remote attackers to cause a denial of service (memory consumption) via URIs that do not exist, because public_html/logs/not_found.log grows without bound, and is loaded into memory for each request. | 7.5 |
2018-05-02 | CVE-2018-0285 | Resource Exhaustion vulnerability in Cisco Prime Service Catalog 11.1.2 A vulnerability in service logging for Cisco Prime Service Catalog could allow an authenticated, remote attacker to deny service to the user interface. | 6.5 |