Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1396

1396 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-24484 ImageMagick: Converting multi-layer nested MVG to SVG can cause DoS — ImageMagick 5.3 Medium2026-02-24
CVE-2026-27576 OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs — openclaw 3.3 -2026-02-21
CVE-2026-26047 Moodle: moodle: uncontrolled resource consumption in tex formula editor leading to denial of service 6.5 Medium2026-02-21
CVE-2026-25535 jsPDF Affected by Client-Side/Server-Side Denial of Service via Malicious GIF Dimensions — jsPDF 6.5 -2026-02-19
CVE-2019-25401 Bematech Printer MP-4200 TH Denial of Service — MP-4200 7.5 High2026-02-18
CVE-2026-20139 Client-Side Denial of Service (DoS) through ''/splunkd/__raw/services/authentication/users/username'' REST API endpoint in Splunk Enterprise — Splunk Enterprise 4.3 Medium2026-02-18
CVE-2026-25949 Traefik: TCP readTimeout bypass via STARTTLS on Postgres — traefik 7.5 High2026-02-12
CVE-2026-21435 webtransport-go CloseWithError can block indefinitely — webtransport-go 5.3 Medium2026-02-12
CVE-2025-54149 Qsync Central — Qsync Central 6.2AIMediumAI2026-02-11
CVE-2025-54150 Qsync Central — Qsync Central 6.2AIMediumAI2026-02-11
CVE-2025-54151 Qsync Central — Qsync Central 6.2AIMediumAI2026-02-11
CVE-2025-62854 File Station 5 — File Station 5 7.5AIHighAI2026-02-11
CVE-2026-25762 AdonisJS vulnerable to Denial of Service (DoS) via Unrestricted Memory Buffering in PartHandler during File Type Detection — core 7.5 High2026-02-06
CVE-2026-25579 Navidrome affected by Denial of Service and disk exhaustion via oversized `size` parameter in `/rest/getCoverArt` and `/share/img/<token>` endpoints — navidrome 6.5AIMediumAI2026-02-04
CVE-2026-25140 apko affected by potential unbounded resource consumption in expandapk.ExpandApk on attacker-controlled .apk streams — apko 7.5 High2026-02-04
CVE-2026-25122 apko is vulnerable to unbounded resource consumption in expandapk.Split on attacker-controlled .apk streams — apko 5.5 Medium2026-02-04
CVE-2026-22228 Improper Input Validation Leading to DoS on TP-Link Archer BE230 — Archer BE230 v1.2 4.4AIMediumAI2026-02-03
CVE-2026-0599 Unbounded External Image Fetch in Validation Leads to Resource-Exhaustion DoS in huggingface/text-generation-inference — huggingface/text-generation-inference 7.5AIHighAI2026-02-02
CVE-2025-7105 Denial of Service via JavaScript Memory Overflow in danny-avila/librechat — danny-avila/librechat 7.5AIHighAI2026-02-02
CVE-2025-6208 Uncontrolled Memory Consumption in run-llama/llama_index — run-llama/llama_index 7.5 -2026-02-02
CVE-2026-22259 Suricata dnp3: unbounded transaction growth — suricata 7.5 High2026-01-27
CVE-2026-22258 Suricata DCERPC: unbounded fragment buffering leads to memory exhaustion — suricata 7.5 High2026-01-27
CVE-2025-55102 Eclipse ThreadX NetX Duo 安全漏洞 — Eclipse ThreadX - NetX Duo 7.5AIHighAI2026-01-27
CVE-2026-24001 jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch — jsdiff 7.5AIHighAI2026-01-22
CVE-2026-20080 Cisco IEC6400 Edge Compute Appliance SSH Denial of Service Vulnerability — Cisco Ultra-Reliable Wireless Backhaul 5.3 Medium2026-01-21
CVE-2025-9283 ArmorStart® LT - Multiple Denial-of-Service Vulnerabilities — ArmorStart® LT 7.5AIHighAI2026-01-20
CVE-2025-9282 ArmorStart® LT - Multiple Denial-of-Service Vulnerabilities — ArmorStart® LT 7.5AIHighAI2026-01-20
CVE-2025-9281 ArmorStart® LT - Multiple Denial-of-Service Vulnerabilities — ArmorStart® LT 7.5AIHighAI2026-01-20
CVE-2025-9280 ArmorStart® LT - Multiple Denial-of-Service Vulnerabilities — ArmorStart® LT 7.5AIHighAI2026-01-20
CVE-2025-9279 ArmorStart® LT - Multiple Denial-of-Service Vulnerabilities — ArmorStart® LT 7.5AIHighAI2026-01-20

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1396 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.