Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1396

1396 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-42343 FastGPT: Uncontrolled Resource Consumption leading to Sandbox Exhaustion — FastGPT--2026-05-08
CVE-2026-42212 SolidCAM-GPPL-IDE: XML External Entity (XXE) and billion-laughs DoS in VMID parser — SolidCAM-GPPL-IDE--2026-05-08
CVE-2026-32686 Unbounded exponent in decimal enables unauthenticated DoS — decimal--2026-05-07
CVE-2026-20188 Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Connection Exhaustion Denial of Service Vulnerability — Cisco Crosswork Network Change Automation 7.5 High2026-05-06
CVE-2026-32936 CoreDNS DoH GET path missing size validation causes CPU and memory amplification — coredns--2026-05-05
CVE-2026-42154 Prometheus: remote read endpoint allows denial of service via crafted snappy payload — prometheus 7.5 High2026-05-04
CVE-2026-42402 Apache Neethi: Policy Normalization Unbounded Resource Allocation DoS — Apache Neethi 7.5 High2026-05-01
CVE-2026-42403 Apache Neethi: Circular Policy Reference Infinite Loop — Apache Neethi 7.5 High2026-05-01
CVE-2026-22745 CVE-2026-22745 : Denial of service in static resource handling on Windows platforms — Spring Framework 5.3 Medium2026-04-29
CVE-2026-22740 Spring Framework DoS with Multipart Temp Files in WebFlux — Spring Framework 6.5 Medium2026-04-29
CVE-2026-40980 VMware Spring AI 资源管理错误漏洞 — Spring AI 6.5 Medium2026-04-28
CVE-2026-41680 Marked: OOM Denial of Service via Infinite Recursion in marked Tokenizer — marked 7.5AIHighAI2026-04-24
CVE-2026-41324 basic-ftp vulnerable to denial of service via unbounded memory consumption in Client.list() — basic-ftp 7.5 High2026-04-24
CVE-2026-6844 Binutils: binutils: denial of service vulnerabilities in readelf via crafted elf files — Red Hat Enterprise Linux 10 5.5 Medium2026-04-22
CVE-2026-6022 Uncontrolled Resource Consumption Vulnerability in Telerik UI for ASP.NET AJAX — Telerik UI for ASP.NET AJAX 7.5 High2026-04-22
CVE-2026-6416 Tanium addressed an uncontrolled resource consumption vulnerability in Interact. — Interact 2.7 Low2026-04-22
CVE-2026-41146 facil.io and downstream iodine ruby gem vulnerable to uncontrolled resource consumption and loop with unreachable exit condition — facil.io 5.9AIMediumAI2026-04-22
CVE-2026-41135 free5GC PCF: Memory Leak via CORS Middleware Registration in HTTP Handler Leads to Denial of Service — pcf 7.5 High2026-04-21
CVE-2026-40924 Tekton Pipelines: HTTP Resolver Unbounded Response Body Read Enables Denial of Service via Memory Exhaustion — pipeline 6.5 Medium2026-04-21
CVE-2026-6797 Sanluan PublicCMS DocToHtmlUtils.java ZipSecureFile.setMinflateRatio resource consumption — PublicCMS 4.3 Medium2026-04-21
CVE-2026-39396 OpenBao has Decompression Bomb via Unbounded Copy in OCI Plugin Extraction (DoS) — openbao 3.1 Low2026-04-21
CVE-2026-39320 Signal K Server has an Unauthenticated Regular Expression Denial of Service (ReDoS) via WebSocket Subscription Paths — signalk-server 7.5 High2026-04-21
CVE-2026-6060 Possible DoS via SQL Box — OTRS 4.5 Medium2026-04-20
CVE-2026-6607 lm-sys fastchat Worker API Endpoint api_generate resource consumption — fastchat 5.3 Medium2026-04-20
CVE-2026-6601 Lagom WHMCS Template Datatables resource consumption — WHMCS Template 4.3 Medium2026-04-20
CVE-2026-40347 Python-Multipart affected by Denial of Service via large multipart preamble or epilogue data — python-multipart 5.3 Medium2026-04-17
CVE-2026-40481 monetr: Unauthenticated Stripe webhook reads attacker-sized request bodies before signature validation — monetr 7.5AIHighAI2026-04-17
CVE-2026-40303 zrok allows unauthenticated DoS via unbounded memory allocation in striped session cookie parsing — zrok 7.5 High2026-04-17
CVE-2024-33618 Bosch VMS Central Server 安全漏洞 — BVMS 7.5 High2026-04-15
CVE-2026-35034 Jellyfin: Potential Application DoS from excessively large SyncPlay group names — jellyfin 6.5 Medium2026-04-14

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1396 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.