Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-35034 Jellyfin: Potential Application DoS from excessively large SyncPlay group names — jellyfin 6.5 Medium2026-04-14
CVE-2026-27308 ColdFusion | Uncontrolled Resource Consumption (CWE-400) — ColdFusion 2.4 Low2026-04-14
CVE-2026-27307 ColdFusion | Uncontrolled Resource Consumption (CWE-400) — ColdFusion 2.4 Low2026-04-14
CVE-2026-26171 .NET Denial of Service Vulnerability — .NET 10.0 7.5 High2026-04-14
CVE-2026-2405 Schneider Electric PowerChute Serial Shutdown 资源管理错误漏洞 — PowerChute™ Serial Shutdown 6.5 -2026-04-14
CVE-2026-34166 LiquidJS has a Memory Limit Bypass via Quadratic Amplification in `replace` Filter — liquidjs 3.7 Low2026-04-08
CVE-2026-33459 Uncontrolled Resource Consumption in Kibana Leading to Denial of Service — Kibana 6.5 Medium2026-04-08
CVE-2026-39865 Axios HTTP/2 Session Cleanup State Corruption Vulnerability — axios 5.9 Medium2026-04-08
CVE-2026-35406 Aardvark-dns has incorrect error handling for malformed tcp packets — aardvark-dns 6.2 Medium2026-04-07
CVE-2026-32588 Apache Cassandra: Authenticated DoS via ALTER ROLE Password Hashing — Apache Cassandra 6.5AIMediumAI2026-04-07
CVE-2026-35441 Directus Affected by GraphQL Alias Amplification Denial-of-Service Due to Missing Query Cost/Complexity Limits — directus 6.5 Medium2026-04-06
CVE-2026-34148 Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution — fedify 7.5 High2026-04-06
CVE-2022-4986 Hirschmann EagleSDV Denial of Service via TLS — Hirschmann EagleSDV 7.5 High2026-04-02
CVE-2024-14033 Hirschmann EagleSDV Denial of Service via TLS — Hirschmann EagleSDV 7.5 High2026-04-02
CVE-2026-34593 Ash Framework: Ash.Type.Module.cast_input/2 atom exhaustion via unchecked Module.concat allows BEAM VM crash — ash 6.5AIMediumAI2026-04-02
CVE-2026-34829 Rack: Denial of Service via Unbounded Multipart File Upload Without Content-Length — rack 7.5 High2026-04-02
CVE-2026-34826 Rack: Unbounded Range Count in get_byte_ranges Enables DoS — rack 5.3 Medium2026-04-02
CVE-2026-34230 Rack: Quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header — rack 5.3 Medium2026-04-02
CVE-2026-31935 Suricata http2: unbounded resource consumption — suricata 7.5 High2026-04-02
CVE-2026-22815 AIOHTTP: Uncapped memory usage possible through aiohttp allowing unlimited trailer headers — aiohttp 7.5 -2026-04-01
CVE-2026-34404 Nuxt OG Image vulnerable to DoS via image generation — og-image 7.5 -2026-03-31
CVE-2026-34043 Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects — serialize-javascript 5.9 Medium2026-03-31
CVE-2026-33750 brace-expansion: Zero-step sequence causes process hang and memory exhaustion — brace-expansion 6.5 Medium2026-03-27
CVE-2026-27859 Open-Xchange OX Dovecot Pro 安全漏洞 — OX Dovecot Pro 5.3 Medium2026-03-27
CVE-2026-27858 Open-Xchange OX Dovecot Pro 安全漏洞 — OX Dovecot Pro 7.5 High2026-03-27
CVE-2026-27857 Open-Xchange OX Dovecot Pro 安全漏洞 — OX Dovecot Pro 4.3 Medium2026-03-27
CVE-2026-33541 TSPortal's Uncontrolled User Creation via Validation Side Effects Leads to Potential Denial of Service — TSPortal 6.5 Medium2026-03-26
CVE-2026-4926 path-to-regexp vulnerable to Denial of Service via sequential optional groups — path-to-regexp 7.5 High2026-03-26
CVE-2026-3116 Improper Input Validation in Zoom Plugin Webhook Handler — Mattermost 4.9 Medium2026-03-26
CVE-2026-26233 Denial of Service via HTTP/2 single packet attack on login endpoint — Mattermost 4.3 Medium2026-03-25

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.