Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1396

1396 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-33268 Nanoleaf Lines unauthenticated firmware file store — Lines 6.5 Medium2026-03-25
CVE-2026-33538 Parse Server: Denial of service via unindexed database query for unconfigured auth providers — parse-server 7.5 -2026-03-24
CVE-2026-33474 Vikunja Affected by DoS via Image Preview Generation — vikunja 6.5 Medium2026-03-24
CVE-2026-33176 Rails Active Support has a possible DoS vulnerability in its number helpers — activesupport 7.5 -2026-03-23
CVE-2026-33169 Rails Active Support has a possible ReDoS vulnerability in number_to_delimited — activesupport 7.5 -2026-03-23
CVE-2026-33204 SimpleJWT has an Unauthenticated Denial of Service via JWE header tampering — simplejwt 7.5 High2026-03-20
CVE-2026-33155 DeepDiff has Memory Exhaustion DoS through SAFE_TO_IMPORT — deepdiff 7.5 -2026-03-20
CVE-2026-33123 pypdf has inefficient decoding of array-based streams — pypdf 6.5 -2026-03-20
CVE-2026-27980 Next.js: Unbounded next/image disk cache growth can exhaust storage — next.js 6.5 -2026-03-18
CVE-2026-25771 Wazuh Vulnerable to Denial of Service via Synchronous I/O Blocking in Asynchronous Authentication Middleware — wazuh 5.3 Medium2026-03-17
CVE-2026-4174 Radare2 Mach-O File mach0.c walk_exports_trie resource consumption — Radare2 3.3 Low2026-03-15
CVE-2026-30955 Gokapi vulnerable to DoS in E2E Metadata Parser — Gokapi 6.5 Medium2026-03-13
CVE-2026-23940 Denial of Service via Oversized Package Upload — hexpm 7.5 -2026-03-13
CVE-2026-31958 Tornado has a DoS due to too many multipart parts — tornado 6.5AIMediumAI2026-03-11
CVE-2026-29049 melange: unbounded HTTP download in `melange update-cache` can exhaust disk in CI — melange 4.3 Medium2026-03-06
CVE-2026-26999 Traefik: tcp router clears read deadlines before tls forwarding, enabling stalled handshakes (slowloris doS) — traefik 7.5 High2026-03-05
CVE-2026-1605 Eclipse Jetty 安全漏洞 — Eclipse Jetty 7.5 High2026-03-05
CVE-2026-28435 Payload size limit bypass via gzip decompression in ContentReader (streaming) allows oversized request bodies in cpp-httplib — cpp-httplib 7.5 High2026-03-04
CVE-2026-20066 Multiple Cisco Products Snort 3 TBD Denial of Service Vulnerability — Cisco Secure Firewall Threat Defense (FTD) Software 5.8 Medium2026-03-04
CVE-2026-25673 Potential denial-of-service vulnerability in URLField via Unicode normalization on Windows — Django 7.5AIHighAI2026-03-03
CVE-2026-28412 Textream Vulnerable to Uncontrolled Resource Consumption (Denial of Service) — textream 6.5 Medium2026-03-02
CVE-2026-28351 Manipulated RunLengthDecode streams can exhaust RAM — pypdf 4.3 -2026-02-27
CVE-2026-21619 Unsafe Deserialization of Erlang Terms in hex_core — hex_core 9.8 -2026-02-27
CVE-2026-26937 Uncontrolled Resource Consumption in Kibana Leading to Denial of Service — Kibana 6.5 Medium2026-02-26
CVE-2026-27888 pypdf: Manipulated FlateDecode XFA streams can exhaust RAM — pypdf 6.5AIMediumAI2026-02-26
CVE-2026-27633 TinyWeb has Unbounded Content-Length Memory Exhaustion (DoS) — TinyWeb 7.5AIHighAI2026-02-25
CVE-2026-27630 TinyWeb vulnerable to Remote Denial of Service via Thread/Connection Exhaustion (Slowloris) — TinyWeb 7.5AIHighAI2026-02-25
CVE-2026-27204 Wasmtime WASI implementations are vulnerable to guest-controlled resource exhaustion — wasmtime 6.5 -2026-02-24
CVE-2026-26066 ImageMagick has infinite loop when writing IPTCTEXT leads to denial of service via crafted profile — ImageMagick 6.2 Medium2026-02-24
CVE-2026-24485 ImageMagick: Infinite loop vulnerability when parsing a PCD file — ImageMagick 7.5 High2026-02-24

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1396 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.