Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2024-22164 Denial of Service of an Investigation in Splunk Enterprise Security through Investigation attachments — Splunk Enterprise Security (ES) 4.3 Medium2024-01-09
CVE-2024-21651 XWiki Denial of Service attack through attachments — xwiki-platform 7.5 High2024-01-08
CVE-2024-0241 encoded_id-rails Denial of Service Vulnerability 7.5AIHighAI2024-01-04
CVE-2023-26157 libredwg 安全漏洞 — libredwg 5.5 Medium2024-01-02
CVE-2023-50730 Grackle has StackOverflowError in GraphQL query processing — grackle 7.5 High2023-12-22
CVE-2023-46131 Grails® data binding causes JVM crash and/or DoS — grails-core 6.5 Medium2023-12-20
CVE-2023-50249 Sentry's Astro SDK vulnerable to ReDoS — sentry-javascript 7.5 High2023-12-20
CVE-2023-50707 Uncontrolled Resource Consumption in EFACEC BCU 500 — BCU 500 9.6 Critical2023-12-19
CVE-2023-46104 Apache Superset: Allows for uncontrolled resource consumption via a ZIP bomb — Apache Superset 6.5 Medium2023-12-19
CVE-2023-6193 Unbounded queuing of path validation messages in cloudflare-quiche — quiche 5.3 Medium2023-12-12
CVE-2023-49809 Todo plugin gets crashed and disabled by member — Mattermost 4.3 Medium2023-12-12
CVE-2023-45847 Playbook Plugin Crash via Run Checklist — Mattermost 4.3 Medium2023-12-12
CVE-2023-5870 Postgresql: role pg_signal_backend can signal certain superuser processes. — Red Hat Advanced Cluster Security 4.2 2.2 Low2023-12-10
CVE-2023-4486 Uncontrolled Resource Consumption in Metasys and Facility Explorer — Metasys NAE55/SNE/SNC 7.5 High2023-12-07
CVE-2023-35909 WordPress Ninja Forms Plugin <= 3.6.25 is vulnerable to Denial of Service Attack — Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress 5.3 Medium2023-12-07
CVE-2023-6180 Resource exhaustion via memory leak in tokio-boring — tokio-boring 5.3 Medium2023-12-05
CVE-2023-39248 Dell OS10 Networking Switches 安全漏洞 — Dell Networking OS10 7.5 High2023-12-05
CVE-2023-49290 Malicious parameters can cause a denial of service in lestrrat-go/jwx — jwx 5.3 Medium2023-12-04
CVE-2023-47633 Uncontrolled Resource Consumption in Traefik — traefik 7.5 High2023-12-04
CVE-2023-40692 IBM Db2 denial of service — Db2 for Linux, UNIX and Windows 5.9 Medium2023-12-03
CVE-2023-5915 Yokogawa Electric 安全漏洞 — STARDOM 7.5 -2023-12-01
CVE-2023-48713 Knative Serving vulnerable to attacker-controlled pod causing denial of service of autoscaler — serving 6.5 Medium2023-11-28
CVE-2023-48369 Log Flooding due to specially crafted requests in different endpoints — Mattermost 4.3 Medium2023-11-27
CVE-2023-40703 Denial of Service via specially crafted block fields in Mattermost Boards — Mattermost 4.3 Medium2023-11-27
CVE-2023-48268 Denial of Service via Board Import Zip Bomb — Mattermost 4.3 Medium2023-11-27
CVE-2023-6277 Libtiff: out-of-memory in tiffopen via a craft file — Red Hat Enterprise Linux 6 6.5 Medium2023-11-24
CVE-2023-36038 ASP.NET Core Denial of Service Vulnerability — ASP.NET Core 8.0 8.2 High2023-11-14
CVE-2023-44321 Siemens SCALANCE 多款产品安全漏洞 — RUGGEDCOM RM1224 LTE(4G) EU 2.7 Low2023-11-14
CVE-2023-42813 Denial of service from malicious manifest in kyverno — kyverno 6.1 Medium2023-11-13
CVE-2023-5759 Unauthenticated Remote Denial-of-Service via Buffer in Helix Core — Helix Core 7.5 High2023-11-08

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.