CWE-405
Asymmetric Resource Consumption (Amplification)
The product does not properly control situations in which an adversary can cause the product to consume or produce excessive resources without requiring the adversary to invest equivalent work or otherwise prove authorization, i.e., the adversary's influence is "asymmetric."
40 vulnerabilities with CWE-405
CVE-2024-55628
HIGH
Suricata <7.0.8 - Info Disclosure
CVSS 7.5
CVE-2024-56200
HIGH
Altair - DoS
CVSS 8.6
CVE-2024-49363
HIGH
Misskey <2024.10.1 - DoS
CVSS 7.4
CVE-2024-45590
HIGH
Openjsf Body-parser < 1.20.3 - Denial of Service
CVSS 7.5
CVE-2024-40705
MEDIUM
IBM InfoSphere Information Server - Info Disclosure
CVSS 6.5
CVE-2024-34702
MEDIUM
Botan <3.5.0-2.19.5 - Info Disclosure
CVSS 5.3
CVE-2024-39743
MEDIUM
IBM MQ Operator < 2.0.24 - Denial of Service
CVSS 5.9
CVE-2024-34703
HIGH
Botan <3.3.0, <2.19.4 - DoS
CVSS 7.5
CVE-2024-0450
MEDIUM
CPython <3.12.1-3.8.18 - Zip Bomb
CVSS 6.2
CVE-2024-28214
LOW
Naver Ngrinder < 3.5.9 - Denial of Service
CVSS 2.7
CVE-2023-2992
HIGH
Lenovo Nextscale N1200 Enclosure Firmware - Denial of Service
CVSS 7.5
CVE-2021-38447
HIGH
OCI OpenDDS <3.18.1 - DoS
CVSS 8.6
CVE-2021-21359
MEDIUM
TYPO3 <9.5.25, 10.4.14, 11.1.1 - DoS
CVSS 5.9
CVE-2019-11479
HIGH
Linux kernel - DoS
CVSS 7.5
CVE-2018-15492
HIGH
Sentinel License Manager <8.5.3.35 - DoS
CVSS 7.5
Details
Vulnerabilities
40