Vulnerabilities > Uncontrolled Resource Consumption ('Resource Exhaustion')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-05-17 | CVE-2021-32455 | Resource Exhaustion vulnerability in Sitel-Sa Cap/Prx Firmware 5.2.01 SITEL CAP/PRX firmware version 5.2.01, allows an attacker with access to the device´s network to cause a denial of service condition on the device. | 6.1 |
2021-05-14 | CVE-2021-32816 | Resource Exhaustion vulnerability in Protonmail ProtonMail Web Client is the official AngularJS web client for the ProtonMail secure email service. | 5.0 |
2021-05-13 | CVE-2021-29506 | Resource Exhaustion vulnerability in Graphhopper GraphHopper is an open-source Java routing engine. | 4.0 |
2021-05-13 | CVE-2021-22139 | Resource Exhaustion vulnerability in Elastic Kibana Kibana versions before 7.12.1 contain a denial of service vulnerability was found in the webhook actions due to a lack of timeout or a limit on the request size. | 4.0 |
2021-05-13 | CVE-2021-32918 | Resource Exhaustion vulnerability in multiple products An issue was discovered in Prosody before 0.11.9. | 7.5 |
2021-05-12 | CVE-2020-25242 | Resource Exhaustion vulnerability in Siemens products A vulnerability has been identified in SIMATIC NET CP 343-1 Advanced (incl. | 7.8 |
2021-05-11 | CVE-2021-29509 | Resource Exhaustion vulnerability in multiple products Puma is a concurrent HTTP 1.1 server for Ruby/Rack applications. | 7.5 |
2021-05-11 | CVE-2021-27617 | Resource Exhaustion vulnerability in SAP Netweaver Process Integration The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. | 4.0 |
2021-05-11 | CVE-2021-30504 | Resource Exhaustion vulnerability in Jetbrains Intellij Idea In JetBrains IntelliJ IDEA before 2021.1, DoS was possible because of unbounded resource allocation. | 5.0 |
2021-05-10 | CVE-2021-32053 | Resource Exhaustion vulnerability in Fhir Hapi Fhir JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. | 5.0 |