Vulnerabilities > Uncontrolled Resource Consumption ('Resource Exhaustion')

DATE CVE VULNERABILITY TITLE RISK
2023-01-13 CVE-2023-22396 Resource Exhaustion vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in TCP processing on the Routing Engine (RE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to send crafted TCP packets destined to the device, resulting in an MBUF leak that ultimately leads to a Denial of Service (DoS).
network
low complexity
juniper CWE-400
7.5
2023-01-13 CVE-2023-22400 Resource Exhaustion vulnerability in Juniper Junos OS Evolved
An Uncontrolled Resource Consumption vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS).
network
low complexity
juniper CWE-400
7.5
2023-01-12 CVE-2022-4344 Resource Exhaustion vulnerability in Wireshark
Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file
network
low complexity
wireshark CWE-400
4.3
2023-01-11 CVE-2022-34335 Resource Exhaustion vulnerability in IBM Sterling Partner Engagement Manager 6.1.2/6.2.0/6.2.1
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.1 could allow an authenticated user to exhaust server resources which could lead to a denial of service.
network
low complexity
ibm CWE-400
6.5
2023-01-10 CVE-2023-21547 Resource Exhaustion vulnerability in Microsoft products
Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
network
low complexity
microsoft CWE-400
7.5
2023-01-10 CVE-2023-21557 Resource Exhaustion vulnerability in Microsoft products
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
network
low complexity
microsoft CWE-400
7.5
2022-12-27 CVE-2019-25072 Resource Exhaustion vulnerability in Tendermint
Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.
network
low complexity
tendermint CWE-400
7.5
2022-12-27 CVE-2022-3064 Resource Exhaustion vulnerability in Yaml Project Yaml
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
network
low complexity
yaml-project CWE-400
7.5
2022-12-27 CVE-2022-4767 Denial of Service in GitHub repository usememos/memos prior to 0.9.1.
network
low complexity
CWE-400
7.5
2022-12-26 CVE-2022-24118 Certain General Electric Renewable Energy products allow attackers to use a code to trigger a reboot into the factory default configuration.
network
low complexity
CWE-400
critical
9.1