Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-66019 pypdf manipulated LZWDecode streams can exhaust RAM — pypdf 4.3AIMediumAI2025-11-25
CVE-2025-13466 body-parser vulnerable to denial of service when url encoding is used — body-parser 5.3AIMediumAI2025-11-24
CVE-2025-65947 thread-amount is Vulnerable to Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS — thread-amount 6.5 -2025-11-21
CVE-2025-6599 Zyxel DX3301-T0 资源管理错误漏洞 — DX3301-T0 firmware 5.3 Medium2025-11-18
CVE-2025-11681 Denial of Service condition in M-Files Server — M-Files Server 6.5AIMediumAI2025-11-17
CVE-2021-4467 Positive Technologies MaxPatrol 8 & XSpider Remote DoS — MaxPatrol 8 (Server) 7.5 -2025-11-14
CVE-2021-4465 ReQuest Serious Play F3 Media Server <= 7.0.3 Remote DoS — ReQuest Serious Play Pro 7.5 -2025-11-14
CVE-2023-7326 Epson Stylus SX510W Printer Remote Power Off DoS — Epson Stylus SX510W 7.5 -2025-11-12
CVE-2025-64388 Denial of service through specific packets — TCPRS1plus 7.5 -2025-10-31
CVE-2025-30188 Open-Xchange OX App Suite 安全漏洞 — OX App Suite 7.5 High2025-10-31
CVE-2025-6176 Brotli decompression bomb DoS in scrapy/scrapy — scrapy/scrapy 7.5 -2025-10-31
CVE-2025-8849 Denial of Service in danny-avila/librechat — danny-avila/librechat 7.5 -2025-10-30
CVE-2025-5342 Denial of Service (DoS) — ManageEngine Exchange Reporter Plus 4.3 Medium2025-10-30
CVE-2025-10932 AS2 module allows uncontrolled file uploads — MOVEit Transfer 8.2 High2025-10-29
CVE-2025-62260 Liferay Portal和Liferay DXP 资源管理错误漏洞 — Portal 7.5AIHighAI2025-10-27
CVE-2025-12194 Bouncy Castle Java 安全漏洞 — Bouncy Castle for Java FIPS 7.5 -2025-10-24
CVE-2025-62706 Authlib : JWE zip=DEF decompression bomb enables DoS — authlib 6.5 Medium2025-10-22
CVE-2025-59043 OpenBao vulnerable to denial of service via malicious JSON request processing — openbao 7.5 High2025-10-17
CVE-2025-33177 NVIDIA Jetson Linux和NVIDIA IGX OS 资源管理错误漏洞 — Jetson Orin Series 5.5 Medium2025-10-14
CVE-2025-59502 Remote Procedure Call Denial of Service Vulnerability — Windows 10 Version 1809 7.5 High2025-10-14
CVE-2025-11635 Tomofun Furbo 360 File Upload resource consumption — Furbo 360 4.3 Medium2025-10-12
CVE-2025-61919 Rack is vulnerable to a memory-exhaustion DoS through unbounded URL-encoded body parsing — rack 7.5 High2025-10-10
CVE-2025-59975 Junos Space: Flooding device with inbound API calls leads to WebUI and CLI management access DoS — Junos Space 7.5 High2025-10-09
CVE-2025-52961 Junos OS Evolved: PTX Series except PTX10003: An unauthenticated adjacent attacker sending specific valid traffic can cause a memory leak in cfmman leading to FPC crash and restart — Junos OS Evolved 6.5 Medium2025-10-09
CVE-2025-61772 Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion) — rack 7.5 High2025-10-07
CVE-2025-61771 Rack's multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion) — rack 7.5 High2025-10-07
CVE-2025-61770 Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion) — rack 7.5 High2025-10-07
CVE-2025-52867 Qsync Central — Qsync Central 7.5 -2025-10-03
CVE-2025-61600 Unbounded Memory Allocation in Stalwart IMAP parser — stalwart 7.5 High2025-10-02
CVE-2025-61595 MANTRA tx gas limit is not enforced in send hooks — mantrachain 5.3AIMediumAI2025-10-02

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.