Vulnerabilities > Uncontrolled Resource Consumption ('Resource Exhaustion')

DATE CVE VULNERABILITY TITLE RISK
2017-04-24 CVE-2017-2333 Resource Exhaustion vulnerability in Juniper Northstar Controller 2.1.0
A persistent denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a malicious, network-based, authenticated attacker to consume enough system resources to cause a persistent denial of service by visiting certain specific URLs on the server.
network
low complexity
juniper CWE-400
6.5
2017-04-24 CVE-2017-2327 Resource Exhaustion vulnerability in Juniper Northstar Controller 2.1.0
A denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to consume large amounts of system resources leading to a cascading denial of services.
local
low complexity
juniper CWE-400
5.5
2017-04-20 CVE-2017-3793 Resource Exhaustion vulnerability in Cisco Adaptive Security Appliance Software
A vulnerability in the TCP normalizer of Cisco Adaptive Security Appliance (ASA) Software (8.0 through 8.7 and 9.0 through 9.6) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause Cisco ASA and FTD to drop any further incoming traffic on all interfaces, resulting in a denial of service (DoS) condition.
network
high complexity
cisco CWE-400
4.0
2017-04-18 CVE-2017-7940 Resource Exhaustion vulnerability in Entropymine Imageworsener 1.3.0
The iw_read_gif_file function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to consume an amount of available memory via a crafted file.
local
low complexity
entropymine CWE-400
5.5
2017-04-14 CVE-2016-3104 Resource Exhaustion vulnerability in Mongodb 2.4.0/2.6.0
mongod in MongoDB 2.6, when using 2.4-style users, and 2.4 allow remote attackers to cause a denial of service (memory consumption and process termination) by leveraging in-memory database representation when authenticating against a non-existent database.
network
low complexity
mongodb CWE-400
7.5
2017-04-07 CVE-2017-6019 Resource Exhaustion vulnerability in Schneider-Electric Conext Combox 865-1058 Firmware 3.03
An issue was discovered in Schneider Electric Conext ComBox, model 865-1058, all firmware versions prior to V3.03 BN 830.
network
low complexity
schneider-electric CWE-400
7.5
2017-04-07 CVE-2017-3885 Resource Exhaustion vulnerability in Cisco Secure Firewall Management Center
A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources.
network
high complexity
cisco CWE-400
5.9
2017-04-03 CVE-2017-7397 Resource Exhaustion vulnerability in Backbox Linux 4.6
BackBox Linux 4.6 allows remote attackers to cause a denial of service (ksoftirqd CPU consumption) via a flood of packets with Martian source IP addresses (as defined in RFC 1812 section 5.3.7).
network
low complexity
backbox CWE-400
7.5
2017-04-02 CVE-2016-8780 Resource Exhaustion vulnerability in Huawei products
Huawei CloudEngine 6800 V100R006C00, CloudEngine 7800 V100R006C00, CloudEngine 8800 V100R006C00, and CloudEngine 12800 V100R006C00 allow remote attackers with specific permission to store massive files to exhaust the shared storage space, leading to a DoS condition.
network
low complexity
huawei CWE-400
6.5
2017-04-02 CVE-2017-2461 Resource Exhaustion vulnerability in Apple products
An issue was discovered in certain Apple products.
network
low complexity
apple CWE-400
7.5