Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2024-27085 Denial of service through invites in Discourse — discourse 6.5 Medium2024-03-15
CVE-2024-27100 Denial of service via Staff Actions in Discourse — discourse 6.5 Medium2024-03-15
CVE-2024-24827 No rate limits on POST /uploads endpoint in Discourse — discourse 5.3 Medium2024-03-15
CVE-2024-28854 Slow loris vulnerability with default configuration in tls-listener — tls-listener 7.5 High2024-03-15
CVE-2024-2446 Mattermost 安全漏洞 — Mattermost 4.3 Medium2024-03-15
CVE-2024-28053 Resource Exhaustion via the Invitation Feature — Mattermost 3.1 Low2024-03-15
CVE-2024-24975 Denial of Service for mobile app users due to automatic code highlighting — Mattermost Mobile 3.5 Low2024-03-15
CVE-2024-1410 Unbounded storage of information related to connection ID retirement, in quiche — quiche 3.7 Low2024-03-12
CVE-2024-1765 Unlimited resource allocation by QUIC CRYPTO frames flooding in quiche — quiche 5.9 Medium2024-03-12
CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability — Microsoft Visual Studio 2022 version 17.9 7.5 High2024-03-12
CVE-2024-21392 .NET and Visual Studio Denial of Service Vulnerability — Microsoft Visual Studio 2022 version 17.9 7.5 High2024-03-12
CVE-2024-28122 JWX vulnerable to a denial of service attack using compressed JWE message — jwx 6.8 Medium2024-03-09
CVE-2024-28176 jose vulnerable to resource exhaustion via specifically crafted JWE with compressed plaintext — jose 4.9 Medium2024-03-09
CVE-2022-43880 IBM QRadar WinCollect Agent — QRadar WinCollect Agent 4.4 Medium2024-03-03
CVE-2024-1953 Mattermost 安全漏洞 — Mattermost 4.3 Medium2024-02-29
CVE-2024-24988 Excessive resource consumption when sending long emoji names in user custom status — Mattermost 4.3 Medium2024-02-29
CVE-2024-26141 Possible DoS Vulnerability with Range Header in Rack — rack 5.8 Medium2024-02-28
CVE-2024-20344 Cisco UCS 6400 Series Fabric Interconnects 安全漏洞 — Cisco Unified Computing System (Managed) 5.3 Medium2024-02-28
CVE-2024-20321 Cisco NX-OS Software 安全漏洞 — Cisco NX-OS Software 8.6 High2024-02-28
CVE-2024-27088 es5-ext Regular Expression Denial of Service in `function#copy` and `function#toStringTokens` — es5-ext--2024-02-26
CVE-2024-22201 Jetty connection leaking on idle timeout when TCP congested — jetty.project 7.5 High2024-02-26
CVE-2024-23835 Suricata's pgsql: memory exhaustion use on record parsing — suricata 7.5 High2024-02-26
CVE-2024-1635 Undertow: out-of-memory error after several closed connections with wildfly-http-client protocol 7.5 High2024-02-19
CVE-2024-25978 Msa-24-0001: denial of service risk in file picker unzip functionality 7.5 High2024-02-19
CVE-2024-24750 Backpressure request ignored in fetch() in Undici — undici 6.5 Medium2024-02-16
CVE-2024-20716 Force high-usage of resources by generating unlimited coupons: Adobe Commerce — Adobe Commerce 4.9 Medium2024-02-15
CVE-2024-25617 Denial of Service in HTTP Header parser in squid proxy — squid 5.3 Medium2024-02-14
CVE-2024-23952 Apache Superset: Allows for uncontrolled resource consumption via a ZIP bomb (version range fix for CVE-2023-46104) — Apache Superset 6.5 Medium2024-02-14
CVE-2024-24814 Denial of service when manipulating mod_auth_openidc_session_chunks cookie in mod_auth_openidc — mod_auth_openidc 7.5 High2024-02-13
CVE-2024-21342 Windows DNS Client Denial of Service Vulnerability — Windows 11 version 22H2 7.5 High2024-02-13

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.