Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1398

1398 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2021-1266 Cisco Managed Services Accelerator Denial of Service Vulnerability — Cisco Managed Services Accelerator 4.3 Medium2021-02-04
CVE-2021-21294 Unbounded connection acceptance in http4s-blaze-server — http4s 7.5 High2021-02-02
CVE-2021-21293 Unbounded connection acceptance leads to file handle exhaustion — blaze 7.5 High2021-02-02
CVE-2021-21285 Docker daemon crash during image pull of malicious image — moby 6.5 Medium2021-02-02
CVE-2021-21254 Regular expression Denial of Service in Markdown plugin — ckeditor5 6.5 Medium2021-01-29
CVE-2021-25909 ZIV AUTOMATION 4CCT Denial of Service vulnerability — 4CCT-EA6-334126BF 8.6 High2021-01-29
CVE-2021-20185 Moodle 资源管理错误漏洞 — moodle 5.3 -2021-01-28
CVE-2021-21271 Denial of service in TenderMint Core — tendermint 6.5 Medium2021-01-26
CVE-2020-27295 Honeywell OPC UA Tunneller 资源管理错误漏洞 — OPC UA Tunneller 7.5 -2021-01-26
CVE-2020-8295 Nextcloud 资源管理错误漏洞 — Nextcloud Server 7.5 -2021-01-26
CVE-2020-8293 Nextcloud 资源管理错误漏洞 — Nextcloud Server 6.5 -2021-01-26
CVE-2021-1312 Cisco Elastic Services Controller Denial of Service Vulnerability — Cisco Elastic Services Controller 5.3 Medium2021-01-20
CVE-2021-0215 Junos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwarding engine due to 802.1X authenticator port interface flaps — Junos OS 6.5 Medium2021-01-15
CVE-2021-0202 Junos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and Bridging (IRB) interface is mapped to a VPLS instance or a Bridge-Domain — Junos OS 7.5 High2021-01-15
CVE-2021-21252 Regular expression denial of service in jquery-validation — jquery-validation 5.3 Medium2021-01-13
CVE-2021-21236 Regular Expression Denial of Service in CairoSVG — CairoSVG 5.7 Medium2021-01-06
CVE-2021-21235 Infinite loop in parsing PNG files in — exif-rs 5.7 Medium2021-01-06
CVE-2020-29490 DELL Dell EMC Unity和UnityVSA 资源管理错误漏洞 — Unity 7.5 High2021-01-05
CVE-2020-26289 Regular expression Denial of Service in date-and-time — date-and-time 7.5 High2020-12-28
CVE-2020-26264 LES Server DoS via GetProofsV2 — go-ethereum 6.5 Medium2020-12-11
CVE-2020-12516 WAGO: PLC families 750-88x and 750-352 prone to DoS attack — 750-331/xxx-xxx 7.5 High2020-12-10
CVE-2020-26257 Denial of service attack via incorrect parameters to federation APIs — synapse 6.5 Medium2020-12-09
CVE-2020-26256 Denial of service in fast-csv — fast-csv 5.7 Medium2020-12-08
CVE-2020-25630 Moodle 资源管理错误漏洞 — Moodle 7.5 -2020-12-08
CVE-2020-12524 Phoenix Contact BTP Touch Panels uncontrolled resource consumption — BTP Touch Panel 7.5 High2020-12-02
CVE-2020-5423 Cloud Controller is vulnerable to denial of service via YAML parsing — CAPI 7.5 -2020-12-02
CVE-2020-8277 Oracle GraalVM 资源管理错误漏洞 — Node 7.5 -2020-11-19
CVE-2020-15783 Siemens SIMATIC S7-300 资源管理错误漏洞 — SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) 7.5 -2020-11-12
CVE-2020-3554 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Denial of Service Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2020-10-21
CVE-2020-3563 Cisco Firepower Threat Defense Software TCP Flood Denial of Service Vulnerability — Cisco Firepower Threat Defense Software 8.6 -2020-10-21

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1398 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.