CWE-770: CWE-770
Yearly Trend
Top Affected Vendors
All CWE-770 CVEs (508)
This vulnerability in IBM Db2 allows authenticated users to cause denial of service by submitting specially crafted queries. It affects Db2 versions 1...
Jan 30, 2026IBM Db2 databases running vulnerable versions can experience denial of service when specific SELECT queries are executed against certain table types, ...
Jan 30, 2026This vulnerability in IBM Db2 allows authenticated users to cause denial of service by exploiting improper resource allocation. It affects Db2 version...
Jan 30, 2026This vulnerability allows authenticated users to submit specially crafted payloads to Discourse's drafts endpoint, causing O(n^2) processing that ties...
Jan 28, 2026This vulnerability in Go's archive/zip package uses an inefficient file name indexing algorithm that can be exploited via specially crafted ZIP archiv...
Jan 28, 2026This vulnerability in Kibana Fleet allows attackers to send specially crafted requests that cause excessive resource allocation, leading to service de...
Jan 13, 2026CVE-2026-0531 is a resource exhaustion vulnerability in Kibana Fleet where specially crafted bulk retrieval requests can cause excessive memory consum...
Jan 13, 2026This vulnerability allows remote attackers to crash vLLM servers running multimodal models with Idefics3 vision implementation by sending a specially ...
Jan 10, 2026This vulnerability allows authenticated users to cause denial of service by sending specially crafted responses to external API calls in GitLab. It af...
Jan 9, 2026This vulnerability allows attackers to upload files at an unrestricted rate in Aris software, potentially causing resource exhaustion like disk space ...
Jan 7, 2026This CVE describes a resource exhaustion vulnerability in QNAP operating systems where authenticated remote attackers can allocate resources without l...
Jan 2, 2026This vulnerability allows authenticated Kibana users with low privileges to send crafted HTTP requests that cause excessive resource allocation, leadi...
Dec 18, 2025This vulnerability allows authenticated Elasticsearch users with low privileges to submit oversized user settings data, causing excessive memory alloc...
Dec 18, 2025This vulnerability in GitLab allows authenticated users to upload specially crafted images that cause a denial of service condition. It affects GitLab...
Dec 11, 2025This vulnerability allows authenticated GitLab users to cause Denial of Service by sending specially crafted API calls with large content parameters. ...
Dec 11, 2025A low-privileged remote attacker can send a webshell request with an empty command containing whitespace, causing the web server to block while waitin...
Dec 9, 2025This vulnerability in IBM watsonx.data allows authenticated users to cause denial of service by exhausting resources in ingestion pods due to improper...
Dec 8, 2025ClipBucket v5 has an authorization bypass vulnerability in its AJAX flagging system that allows unauthenticated users to flag any content (users, vide...
Nov 29, 2025This vulnerability allows authenticated GitLab users with specific permissions to cause a denial of service condition by exploiting HTTP response proc...
Nov 26, 2025This vulnerability in vLLM allows attackers to send specially crafted requests to the /v1/chat/completions and /tokenize endpoints that can block API ...
Nov 21, 2025SpiceDB versions before 1.45.2 have a vulnerability where WriteRelationships calls with large payloads can return success when they actually failed, l...
Nov 10, 2025This vulnerability in IBM Db2 allows authenticated users to cause denial of service by exploiting improper resource allocation. It affects Db2 version...
Nov 7, 2025This vulnerability in QNAP File Station 5 allows authenticated remote attackers to exhaust system resources, potentially causing denial-of-service con...
Nov 7, 2025Mantis Bug Tracker versions 2.27.1 and below are vulnerable to a denial-of-service attack where attackers can submit extremely long notes (over 4.7 mi...
Nov 4, 2025Consul's key/value endpoint is vulnerable to denial of service due to incorrect Content Length header validation. Attackers can send malformed request...
Oct 28, 2025Consul's event endpoint is vulnerable to denial of service (DoS) attacks due to lack of validation on Content-Length headers, allowing attackers to se...
Oct 28, 2025This vulnerability allows unauthenticated attackers to cause denial of service by uploading large files to specific GitLab API endpoints. All GitLab C...
Oct 27, 2025A resource exhaustion vulnerability in Qsync Central allows authenticated attackers to consume system resources, potentially causing denial of service...
Oct 3, 2025This vulnerability in Qsync Central allows authenticated remote attackers to allocate resources without limits, potentially causing denial of service ...
Oct 3, 2025This vulnerability in Qsync Central allows authenticated remote attackers to perform resource exhaustion attacks by allocating resources without limit...
Oct 3, 2025This vulnerability in Qsync Central allows authenticated remote attackers to exhaust system resources through unlimited allocation, potentially causin...
Oct 3, 2025This vulnerability allows authenticated GitLab users to disrupt background job processing by submitting malicious content in commit messages, merge re...
Sep 12, 2025This vulnerability in IBM Security Verify Information Queue allows remote attackers to cause denial of service by sending specially crafted requests w...
Sep 10, 2025This vulnerability in QNAP File Station 5 allows authenticated attackers to exhaust system resources through uncontrolled allocation, potentially caus...
Aug 29, 2025This vulnerability in Qsync Central allows authenticated remote attackers to perform resource exhaustion attacks by allocating resources without limit...
Aug 29, 2025This vulnerability in Liferay Portal and DXP allows authenticated users to upload unlimited files through forms, which are stored in the document libr...
Aug 22, 2025This vulnerability in Liferay Portal and DXP allows authenticated users to upload unlimited files through object entries attachment fields, which are ...
Aug 22, 2025This vulnerability in Helm allows attackers to craft malicious JSON Schema files that cause Helm to consume all available memory, leading to out-of-me...
Aug 14, 2025This vulnerability in GitLab CE/EE allows authenticated users to cause denial of service through improper input validation in HTTP responses. It affec...
Jun 12, 2025A denial-of-service vulnerability in GitLab CE/EE allows attackers to crash the service by exploiting insufficient input validation in Board Names. Al...
Jun 12, 2025This vulnerability in GitLab allows authenticated users to trigger a denial of service condition due to insufficient input validation. It affects all ...
May 22, 2025A vulnerability in ctrlX OS web application allows authenticated low-privileged attackers to cause denial-of-service via crafted HTTP requests. This a...
Apr 30, 2025This vulnerability allows attackers to create task items with excessive actions via the UpdateRunTaskActions GraphQL operation, causing server overloa...
Apr 24, 2025This CVE describes a memory exhaustion vulnerability in Helm where specially crafted chart archive files can expand to be significantly larger uncompr...
Apr 9, 2025This vulnerability in vLLM's outlines library cache allows denial of service attacks. A malicious user can send numerous short decoding requests with ...
Mar 19, 2025This vulnerability in Datalust Seq allows attackers to bypass event body size limits by exploiting identifier expansion in message templates. This can...
Mar 11, 2025This vulnerability allows remote attackers to cause Denial of Service on Microsoft HoloLens devices by sending excessive requests to the pairing API t...
Mar 6, 2025This vulnerability allows attackers to send excessive password reset emails to legitimate users by exploiting missing rate limiting in the 'Forgot Pas...
Feb 20, 2025Foundry Artifacts is vulnerable to a Denial of Service attack where an attacker can fill up disk space by supplying a malicious size argument. This af...
Feb 18, 2025This vulnerability allows attackers to cause denial of service in GitLab by creating unbounded symbols via the scopes parameter in Personal Access Tok...
Feb 12, 2025About CWE-770 (CWE-770)
Our database tracks 508 CVEs classified as CWE-770, with 6 rated critical and 278 rated high severity. The average CVSS score for CWE-770 vulnerabilities is 6.8.
External reference: View CWE-770 on MITRE CWE →
Monitor CWE-770 Vulnerabilities
Get alerted when new CWE-770 CVEs affect your infrastructure.
Start Monitoring Free