CWE-770: CWE-770
Yearly Trend
Top Affected Vendors
All CWE-770 CVEs (508)
A denial of service vulnerability in Cilium allows attackers to crash Cilium agents by sending crafted DNS responses to workloads from outside the clu...
Jan 22, 2025Matrix Media Repo (MMR) before version 1.3.5 is vulnerable to a disk fill attack where unauthenticated attackers can force it to download and cache la...
Jan 16, 2025This CVE describes a resource allocation vulnerability in FortiOS that allows remote unauthenticated attackers to send specially crafted requests to s...
Jan 14, 2025Password Pusher versions before v1.49.0 contain a rate limiter bypass vulnerability that allows attackers to forge proxy headers and send unlimited tr...
Nov 20, 2024IBM Db2 databases on Linux, UNIX, and Windows can crash when authenticated users execute specially crafted SQL statements, causing denial of service. ...
Oct 23, 2024CVE-2024-6098 is a resource allocation vulnerability in Kepware products that allows a machine-in-the-middle or misconfigured device to cause a denial...
Aug 16, 2024IBM Db2 databases running versions 10.5, 11.1, and 11.5 on Linux, UNIX, and Windows are vulnerable to denial of service attacks. An attacker can crash...
Jun 12, 2024Minder versions prior to 0.0.51 are vulnerable to a denial-of-service attack where an attacker can crash the server by forcing it to process excessive...
May 27, 2024A local user on systems running vulnerable IBM Db2 versions can cause a denial of service by exploiting a flaw in the database monitor script. The scr...
Nov 7, 2025A denial-of-service vulnerability exists in Django's text wrapping functions when processing extremely long strings. Attackers can cause excessive CPU...
Mar 6, 2025This CVE describes a denial-of-service vulnerability in Dovecot email server where an attacker can send emails with an excessive number of address hea...
Sep 10, 2024This vulnerability in Qsync Central allows authenticated administrators to allocate resources without limits, potentially causing denial of service by...
Feb 11, 2026This vulnerability in Qsync Central allows authenticated attackers with administrator privileges to allocate system resources without limits, potentia...
Feb 11, 2026This vulnerability in QNAP File Station 5 allows a remote attacker with administrator credentials to allocate system resources without limits, potenti...
Feb 11, 2026CVE-2026-1224 is an uncontrolled resource consumption vulnerability in Tanium Discover that could allow attackers to cause denial of service by exhaus...
Jan 26, 2026This CVE describes a resource allocation vulnerability in QNAP operating systems where an authenticated attacker with administrator privileges can exh...
Jan 2, 2026This vulnerability allows authenticated Elasticsearch users with snapshot restore privileges to cause memory exhaustion and denial of service through ...
Dec 18, 2025This vulnerability in Oracle MySQL Server allows high-privileged attackers with network access to cause a denial of service (DoS) by crashing or hangi...
Oct 21, 2025This vulnerability in Oracle MySQL Server's optimizer component allows authenticated high-privileged attackers to cause a denial of service (DoS) by c...
Jul 15, 2025This vulnerability in Keycloak allows denial of service through memory exhaustion when JWT tokens with excessively long expiration times are cached in...
Mar 25, 2025This vulnerability in Oracle MySQL Server allows high-privileged attackers with network access to cause a denial of service (DoS) by crashing or hangi...
Jan 21, 2025This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network access to cause a denial of service by crashing or...
Jan 21, 2025This vulnerability in Oracle MySQL Server allows high-privileged attackers with network access to cause a denial of service (DoS) by crashing or hangi...
Jan 21, 2025This vulnerability in MySQL Server's DDL component allows high-privileged attackers with network access to cause denial of service by crashing or hang...
Jan 21, 2025This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network access to cause a denial of service by crashing or...
Jan 21, 2025This vulnerability in MySQL Server's Optimizer component allows high-privileged attackers with network access to cause denial of service by crashing o...
Jan 21, 2025This vulnerability in EVerest libocpp causes memory leaks through unfreed strdup pointers during connection attempts. It affects EV charging systems u...
Jan 21, 2026Traefik reverse proxy versions before 2.11.38 and 3.6.9 have a memory exhaustion vulnerability in the ForwardAuth middleware. When configured with For...
Mar 5, 2026A heap overflow vulnerability in Rizin allows attackers to execute arbitrary code or cause denial of service by tricking users into analyzing maliciou...
Feb 2, 2026An improper resource initialization vulnerability in Solidigm DC Products firmware could allow an attacker to trigger a denial of service condition. T...
Oct 7, 2024Discourse versions before 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have an application-level denial of service vulnerability in the username change f...
Jan 28, 2026Mastodon servers prior to patched versions allow users to set arbitrarily long names for lists/filters and filter keywords, enabling resource exhausti...
Jan 22, 2026This vulnerability involves improper input handling in a system endpoint that allows attackers to send crafted requests to overload resources, causing...
Jan 15, 2026Coolify's login endpoint has a rate limit bypass vulnerability that allows attackers to perform unlimited credential stuffing and brute-force attacks ...
Jan 5, 2026This vulnerability in FreshRSS allows attackers to globally deny access to RSS feeds by manipulating proxy responses to return HTTP 429 Retry-After he...
Dec 27, 2025A low-privileged remote attacker can exploit SSH functionality to execute commands after authentication, causing resource exhaustion that degrades man...
Dec 9, 2025Ascertia SigningHub versions through 8.6.8 have an email bombing vulnerability in the invite user function due to lack of rate limiting. Authenticated...
Nov 18, 2025This vulnerability in GitLab allows attackers to execute specific GraphQL queries that cause uncontrolled CPU consumption, potentially leading to deni...
Sep 26, 2025This CVE describes a Denial of Service vulnerability in Liferay Portal and DXP where authenticated users can upload profile pictures larger than the 3...
Aug 12, 2025The Yealink RPS API lacks rate limiting, allowing attackers to send excessive requests that could lead to information disclosure. This affects organiz...
Jun 21, 2025This vulnerability in IBM QRadar WinCollect Agent allows remote attackers to cause denial of service by interrupting HTTP requests, leading to memory ...
Apr 11, 2025This vulnerability in GraphicsMagick's JXL image processing lacks proper dimension limits when reading JXL files, allowing attackers to cause excessiv...
Mar 7, 2025This vulnerability in PHPJabbers Car Park Booking System allows attackers to send excessive emails through the Email Settings feature due to missing r...
Feb 20, 2025IBM Aspera Shares versions 1.9.0 through 1.10.0 PL6 have an email rate limiting vulnerability that allows authenticated users to send excessive emails...
Feb 5, 2025This vulnerability in GitLab CE/EE allows attackers to cause uncontrolled CPU consumption by exploiting template parsing during changelog generation, ...
Dec 12, 2024This vulnerability allows authenticated attackers to cause a Denial of Service (DoS) by crashing StorageGRID services. It affects StorageGRID (formerl...
Nov 8, 2024This vulnerability in GitLab allows attackers to cause Denial of Service by abusing API endpoints that filter branches and tags. All GitLab CE/EE inst...
May 14, 2024This vulnerability in IBM App Connect Enterprise allows attackers to cause a denial of service by exploiting improper resource allocation restrictions...
May 14, 2024This vulnerability in MySQL Server's privilege management component allows authenticated attackers with high privileges to cause denial of service by ...
Jan 21, 2025This vulnerability in Huawei's ArkUI framework involves improper resource allocation control, potentially allowing attackers to cause denial-of-servic...
Jun 6, 2025About CWE-770 (CWE-770)
Our database tracks 508 CVEs classified as CWE-770, with 6 rated critical and 278 rated high severity. The average CVSS score for CWE-770 vulnerabilities is 6.8.
External reference: View CWE-770 on MITRE CWE →
Monitor CWE-770 Vulnerabilities
Get alerted when new CWE-770 CVEs affect your infrastructure.
Start Monitoring Free