Vulnerabilities > Uncontrolled Resource Consumption ('Resource Exhaustion')

DATE CVE VULNERABILITY TITLE RISK
2020-12-28 CVE-2020-26289 Resource Exhaustion vulnerability in Date-And-Time Project Date-And-Time
date-and-time is an npm package for manipulating date and time.
network
low complexity
date-and-time-project CWE-400
7.5
2020-12-24 CVE-2020-27722 Resource Exhaustion vulnerability in F5 Big-Ip Access Policy Manager
In BIG-IP APM versions 15.0.0-15.0.1.3, 14.1.0-14.1.3, and 13.1.0-13.1.3.4, under certain conditions, the VDI plugin does not observe plugin flow-control protocol causing excessive resource consumption.
network
low complexity
f5 CWE-400
6.5
2020-12-24 CVE-2020-27724 Resource Exhaustion vulnerability in F5 Big-Ip Access Policy Manager
In BIG-IP APM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, on systems running more than one TMM instance, authenticated VPN users may consume excessive resources by sending specially-crafted malicious traffic over the tunnel.
network
low complexity
f5 CWE-400
6.5
2020-12-23 CVE-2018-1000893 Resource Exhaustion vulnerability in Bitcoinsv Bitcoin SV
Bitcoin SV before 0.1.1 allows uncontrolled resource consumption when deserializing transactions.
network
low complexity
bitcoinsv CWE-400
7.5
2020-12-23 CVE-2018-1000892 Resource Exhaustion vulnerability in Bitcoinsv Bitcoin SV
Bitcoin SV before 0.1.1 allows uncontrolled resource consumption when receiving sendheaders messages.
network
low complexity
bitcoinsv CWE-400
7.5
2020-12-23 CVE-2018-1000891 Resource Exhaustion vulnerability in Bitcoinsv Bitcoin SV
Bitcoin SV before 0.1.1 allows uncontrolled resource consumption when receiving messages with invalid checksums.
network
low complexity
bitcoinsv CWE-400
7.5
2020-12-21 CVE-2018-7580 Resource Exhaustion vulnerability in Philips HUE Firmware
Philips Hue is vulnerable to a Denial of Service attack.
network
low complexity
philips CWE-400
7.5
2020-12-16 CVE-2020-5682 Resource Exhaustion vulnerability in Weseek Growi
Improper input validation in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to cause a denial of service via unspecified vectors.
network
low complexity
weseek CWE-400
7.5
2020-12-11 CVE-2020-26264 Resource Exhaustion vulnerability in Ethereum GO Ethereum
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol.
network
low complexity
ethereum CWE-400
6.5
2020-12-11 CVE-2020-26409 Resource Exhaustion vulnerability in Gitlab
A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.
network
low complexity
gitlab CWE-400
6.5