Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2024-41818 ReDOS at currency parsing fast-xml-parser — fast-xml-parser 7.5 High2024-07-29
CVE-2024-3297 Session establishment lock-up during replay of CASE Sigma1 messages — Matter 6.5 Medium2024-07-24
CVE-2024-40634 Argo CD Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint — argo-cd 7.5 High2024-07-22
CVE-2024-32007 Apache CXF Denial of Service vulnerability in JOSE — Apache CXF 7.5 -2024-07-19
CVE-2024-5795 Denial of Service vulnerability was identified in GitHub Enterprise Server that allowed resource exhaustion — GitHub Enterprise Server 7.7 High2024-07-16
CVE-2024-39908 Denial of service in REXML — rexml 4.3 Medium2024-07-16
CVE-2024-38360 Denial of service via Watched Words in Discourse — discourse 4.9 Medium2024-07-15
CVE-2023-39329 Openjpeg: resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c 6.5 Medium2024-07-13
CVE-2023-39327 Openjpeg: malicious files can cause the program to enter a large loop 4.3 Medium2024-07-13
CVE-2024-39551 Junos OS: SRX Series and MX Series with SPC3 and MS-MPC/MIC: Receipt of specific packets in H.323 ALG causes traffic drop — Junos OS 7.5 High2024-07-11
CVE-2024-39548 Junos OS Evolved: Receipt of specific packets in the aftmand process will lead to a memory leak — Junos OS Evolved 7.5 High2024-07-11
CVE-2024-6036 Denial of Service in gaizhenbiao/chuanhuchatgpt — gaizhenbiao/chuanhuchatgpt 8.1AIHighAI2024-07-10
CVE-2024-39557 Junos OS Evolved: MAC table changes cause a memory leak — Junos OS Evolved 6.5 Medium2024-07-10
CVE-2024-39693 Next.js Denial of Service (DoS) condition — next.js 7.5 High2024-07-10
CVE-2024-21521 opus 安全漏洞 — @discordjs/opus 7.5 High2024-07-10
CVE-2024-21526 node-speaker 安全漏洞 — speaker 7.5 High2024-07-10
CVE-2024-21523 node-images 安全漏洞 — images 7.5 High2024-07-10
CVE-2024-6501 Networkmanager: denial of service 3.1 Low2024-07-09
CVE-2024-38068 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability — Windows 10 Version 1809 7.5 High2024-07-09
CVE-2024-38067 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability — Windows Server 2019 7.5 High2024-07-09
CVE-2024-38031 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability — Windows Server 2019 7.5 High2024-07-09
CVE-2024-38027 Windows Line Printer Daemon Service Denial of Service Vulnerability — Windows 10 Version 1809 6.5 Medium2024-07-09
CVE-2024-30105 .NET and Visual Studio Denial of Service Vulnerability — .NET 8.0 7.5 High2024-07-09
CVE-2024-38015 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability — Windows Server 2019 7.5 High2024-07-09
CVE-2024-35270 Windows iSCSI Service Denial of Service Vulnerability — Windows 10 Version 1809 5.3 Medium2024-07-09
CVE-2023-39328 Openjpeg: denail of service via crafted image file 5.5 Medium2024-07-09
CVE-2024-39895 Directus GraphQL Field Duplication Denial of Service (DoS) — directus 6.5 Medium2024-07-08
CVE-2024-6434 Premium Addons for Elementor <= 4.10.35 - Regular Expressions Denial of Service — Premium Addons for Elementor – Powerful Elementor Templates & Widgets 3.1 Low2024-07-04
CVE-2024-6126 Cockpit: authenticated user can kill any process when enabling pam_env's user_readenv option 3.2 Low2024-07-03
CVE-2024-6427 Uncontrolled Resource Consumption vulnerability in MESbook — MESbook 7.5 High2024-07-03

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.