CWE-405

Asymmetric Resource Consumption (Amplification)

Parent: CWE-400 - Uncontrolled Resource Consumption

The product does not properly control situations in which an adversary can cause the product to consume or produce excessive resources without requiring the adversary to invest equivalent work or otherwise prove authorization, i.e., the adversary's influence is "asymmetric."

40 vulnerabilities with CWE-405
CVE-2024-55628 HIGH
Suricata <7.0.8 - Info Disclosure
CVSS 7.5
CVE-2024-56200 HIGH
Altair - DoS
CVSS 8.6
CVE-2024-49363 HIGH
Misskey <2024.10.1 - DoS
CVSS 7.4
CVE-2024-45590 HIGH
Openjsf Body-parser < 1.20.3 - Denial of Service
CVSS 7.5
CVE-2024-40705 MEDIUM
IBM InfoSphere Information Server - Info Disclosure
CVSS 6.5
CVE-2024-34702 MEDIUM
Botan <3.5.0-2.19.5 - Info Disclosure
CVSS 5.3
CVE-2024-39743 MEDIUM
IBM MQ Operator < 2.0.24 - Denial of Service
CVSS 5.9
CVE-2024-34703 HIGH
Botan <3.3.0, <2.19.4 - DoS
CVSS 7.5
CVE-2024-0450 MEDIUM
CPython <3.12.1-3.8.18 - Zip Bomb
CVSS 6.2
CVE-2024-28214 LOW
Naver Ngrinder < 3.5.9 - Denial of Service
CVSS 2.7
CVE-2023-2992 HIGH
Lenovo Nextscale N1200 Enclosure Firmware - Denial of Service
CVSS 7.5
CVE-2021-38447 HIGH
OCI OpenDDS <3.18.1 - DoS
CVSS 8.6
CVE-2021-21359 MEDIUM
TYPO3 <9.5.25, 10.4.14, 11.1.1 - DoS
CVSS 5.9
CVE-2019-11479 HIGH
Linux kernel - DoS
CVSS 7.5
CVE-2018-15492 HIGH
Sentinel License Manager <8.5.3.35 - DoS
CVSS 7.5
Details
Vulnerabilities 40