Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-23616

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-27 Jan, 2023 | 00:00
Updated At-10 Mar, 2025 | 21:19
Rejected At-
Credits

Discourse membership requests lack character limit

Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, when submitting a membership request, there is no character limit for the reason provided with the request. This could potentially allow a user to flood the database with a large amount of data. However it is unlikely this could be used as part of a DoS attack, as the paths reading back the reasons are only available to administrators. Starting in version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, a limit of 280 characters has been introduced for membership requests.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:27 Jan, 2023 | 00:00
Updated At:10 Mar, 2025 | 21:19
Rejected At:
▼CVE Numbering Authority (CNA)
Discourse membership requests lack character limit

Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, when submitting a membership request, there is no character limit for the reason provided with the request. This could potentially allow a user to flood the database with a large amount of data. However it is unlikely this could be used as part of a DoS attack, as the paths reading back the reasons are only available to administrators. Starting in version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, a limit of 280 characters has been introduced for membership requests.

Affected Products
Vendor
Civilized Discourse Construction Kit, Inc.discourse
Product
discourse
Versions
Affected
  • 3.1.0.beta1
  • From 3.0.1 before 3.0.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400 Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-400
Description: CWE-400 Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
3.13.5LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Version: 3.1
Base score: 3.5
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/discourse/discourse/pull/19993
N/A
https://github.com/discourse/discourse/commit/d5745d34c20c31a221039d8913f33064433003ea
N/A
https://github.com/discourse/discourse/security/advisories/GHSA-6xff-p329-9pgf
N/A
https://github.com/discourse/discourse/commit/3e0cc4a5d9ef44ad902f6985d046ebb32f0a14ee
N/A
Hyperlink: https://github.com/discourse/discourse/pull/19993
Resource: N/A
Hyperlink: https://github.com/discourse/discourse/commit/d5745d34c20c31a221039d8913f33064433003ea
Resource: N/A
Hyperlink: https://github.com/discourse/discourse/security/advisories/GHSA-6xff-p329-9pgf
Resource: N/A
Hyperlink: https://github.com/discourse/discourse/commit/3e0cc4a5d9ef44ad902f6985d046ebb32f0a14ee
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/discourse/discourse/pull/19993
x_transferred
https://github.com/discourse/discourse/commit/d5745d34c20c31a221039d8913f33064433003ea
x_transferred
https://github.com/discourse/discourse/security/advisories/GHSA-6xff-p329-9pgf
x_transferred
https://github.com/discourse/discourse/commit/3e0cc4a5d9ef44ad902f6985d046ebb32f0a14ee
x_transferred
Hyperlink: https://github.com/discourse/discourse/pull/19993
Resource:
x_transferred
Hyperlink: https://github.com/discourse/discourse/commit/d5745d34c20c31a221039d8913f33064433003ea
Resource:
x_transferred
Hyperlink: https://github.com/discourse/discourse/security/advisories/GHSA-6xff-p329-9pgf
Resource:
x_transferred
Hyperlink: https://github.com/discourse/discourse/commit/3e0cc4a5d9ef44ad902f6985d046ebb32f0a14ee
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:28 Jan, 2023 | 00:15
Updated At:08 Feb, 2023 | 17:48

Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, when submitting a membership request, there is no character limit for the reason provided with the request. This could potentially allow a user to flood the database with a large amount of data. However it is unlikely this could be used as part of a DoS attack, as the paths reading back the reasons are only available to administrators. Starting in version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, a limit of 280 characters has been introduced for membership requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Secondary3.13.5LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Type: Primary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Type: Secondary
Version: 3.1
Base score: 3.5
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
CPE Matches

Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>Versions before 3.0.1(exclusive)
cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.1.0
cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.2.0
cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.3.0
cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.4.0
cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*
Civilized Discourse Construction Kit, Inc.
discourse
>>discourse>>1.5.0
cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Primarysecurity-advisories@github.com
CWE ID: CWE-400
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/discourse/discourse/commit/3e0cc4a5d9ef44ad902f6985d046ebb32f0a14eesecurity-advisories@github.com
Patch
Third Party Advisory
https://github.com/discourse/discourse/commit/d5745d34c20c31a221039d8913f33064433003easecurity-advisories@github.com
Patch
Third Party Advisory
https://github.com/discourse/discourse/pull/19993security-advisories@github.com
Patch
Third Party Advisory
https://github.com/discourse/discourse/security/advisories/GHSA-6xff-p329-9pgfsecurity-advisories@github.com
Third Party Advisory
Hyperlink: https://github.com/discourse/discourse/commit/3e0cc4a5d9ef44ad902f6985d046ebb32f0a14ee
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/discourse/discourse/commit/d5745d34c20c31a221039d8913f33064433003ea
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/discourse/discourse/pull/19993
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/discourse/discourse/security/advisories/GHSA-6xff-p329-9pgf
Source: security-advisories@github.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

114Records found

CVE-2024-43105
Matching Score-4
Assigner-Mattermost, Inc.
ShareView Details
Matching Score-4
Assigner-Mattermost, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.21% / 43.93%
||
7 Day CHG~0.00%
Published-23 Aug, 2024 | 07:25
Updated-23 Aug, 2024 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Excessive Resource Consumption via `/export`

Mattermost Plugin Channel Export versions <=1.0.0 fail to restrict concurrent runs of the /export command which allows a user to consume excessive resource by running the /export command multiple times at once.

Action-Not Available
Vendor-Mattermost, Inc.
Product-Mattermost
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-42426
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-4.3||MEDIUM
EPSS-0.23% / 45.63%
||
7 Day CHG-0.04%
Published-09 Dec, 2024 | 14:38
Updated-08 Jan, 2025 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS Versions 9.5.0.x through 9.8.0.x contain an uncontrolled resource consumption vulnerability. A low privilege remote attacker could potentially exploit this vulnerability, leading to denial of service.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-1982
Matching Score-4
Assigner-Mattermost, Inc.
ShareView Details
Matching Score-4
Assigner-Mattermost, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.43% / 61.55%
||
7 Day CHG~0.00%
Published-02 Jun, 2022 | 17:03
Updated-06 Dec, 2024 | 23:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A crafted SVG attachment can crash a Mattermost server

Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post.

Action-Not Available
Vendor-Mattermost, Inc.
Product-mattermost_serverMattermost
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-0489
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-3.5||LOW
EPSS-0.10% / 28.76%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered in GitLab CE/EE affecting all versions starting with 8.15 . It was possible to trigger a DOS by using the math feature with a specific formula in issue comments.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-1099
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.22% / 45.11%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 19:46
Updated-02 Aug, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adding a very large number of tags to a runner in GitLab CE/EE affecting all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows an attacker to impact the performance of GitLab

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-0488
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-3.5||LOW
EPSS-0.20% / 41.76%
||
7 Day CHG~0.00%
Published-28 Mar, 2022 | 18:53
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered in GitLab CE/EE affecting all versions starting with version 8.10. It was possible to trigger a timeout on a page with markdown by using a specific amount of block-quotes.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-39942
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.20% / 42.73%
||
7 Day CHG~0.00%
Published-18 Jan, 2022 | 16:52
Updated-04 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability in GitLab CE/EE affecting all versions starting from 12.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows low-privileged users to bypass file size limits in the NPM package repository to potentially cause denial of service.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-39914
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-3.1||LOW
EPSS-0.18% / 39.41%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 22:39
Updated-04 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A regular expression denial of service issue in GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3 and 14.4.0 could cause excessive usage of resources when a specially crafted username was used when provisioning a new user

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-7610
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.54% / 66.55%
||
7 Day CHG~0.00%
Published-08 Aug, 2024 | 10:30
Updated-29 Aug, 2024 | 15:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Uncontrolled Resource Consumption in GitLab

A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 15.9 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause catastrophic backtracking while parsing results from Elasticsearch.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-33609
Matching Score-4
Assigner-Vaadin Ltd.
ShareView Details
Matching Score-4
Assigner-Vaadin Ltd.
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 41.33%
||
7 Day CHG~0.00%
Published-13 Oct, 2021 | 10:58
Updated-16 Sep, 2024 | 21:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service in DataCommunicator class in Vaadin 8

Missing check in DataCommunicator class in com.vaadin:vaadin-server versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.

Action-Not Available
Vendor-vaadinVaadin
Product-vaadinvaadin-serverVaadin
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-20
Improper Input Validation
CVE-2021-32763
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.31% / 53.45%
||
7 Day CHG~0.00%
Published-20 Jul, 2021 | 16:50
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Regular Expression Denial of Service in OpenProject forum messages

OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the `MessagesController` class of OpenProject has a `quote` method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip `<pre>` tags from the message being quoted. The `(.|\s)` part can match a space character in two ways, so an unterminated `<pre>` tag containing `n` spaces causes Ruby's regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. The issue is fixed in OpenProject 11.3.3. As a workaround, one may install the patch manually.

Action-Not Available
Vendor-openprojectopf
Product-openprojectopenproject
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-29433
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.28% / 51.03%
||
7 Day CHG~0.00%
Published-15 Apr, 2021 | 17:55
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service (via resource exhaustion) due to improper input validation

Sydent is a reference Matrix identity server. In Sydent versions 2.2.0 and prior, sissing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. A patch for the vulnerability is in version 2.3.0. No workarounds are known to exist.

Action-Not Available
Vendor-The Matrix.org Foundation
Product-sydentsydent
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-3759
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.65% / 69.77%
||
7 Day CHG~0.00%
Published-13 Feb, 2023 | 00:00
Updated-21 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.3 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. An attacker may upload a crafted CI job artifact zip file in a project that uses dynamic child pipelines and make a sidekiq job allocate a lot of memory. In GitLab instances where Sidekiq is memory-limited, this may cause Denial of Service.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-1266
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.38% / 58.51%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:35
Updated-08 Nov, 2024 | 23:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Managed Services Accelerator Denial of Service Vulnerability

A vulnerability in the REST API of Cisco Managed Services Accelerator (MSX) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the way that the affected software logs certain API requests. An attacker could exploit this vulnerability by sending a flood of crafted API requests to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-managed_services_acceleratorCisco Managed Services Accelerator
CWE ID-CWE-400
Uncontrolled Resource Consumption
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found