Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-20370 Denial of Service (DoS) through Multiple LDAP Bind Requests in Splunk Enterprise — Splunk Enterprise 4.9 Medium2025-10-01
CVE-2025-11149 node-static 安全漏洞 — node-static 7.5 High2025-09-30
CVE-2025-59830 Rack QueryParser has an unsafe default allowing params_limit bypass via semicolon-separated parameters — rack 7.5 High2025-09-25
CVE-2025-6921 Regular Expression Denial of Service (ReDoS) in huggingface/transformers — huggingface/transformers 7.5 -2025-09-23
CVE-2025-4444 Tor Onion Service Descriptor resource consumption — Tor 3.7 Low2025-09-18
CVE-2025-58767 REXML has a DoS condition when parsing malformed XML file — rexml 7.5AIHighAI2025-09-17
CVE-2025-35432 CISA Thorium does not rate limit account verification email messages — Thorium 5.3 Medium2025-09-17
CVE-2025-43796 Liferay Portal和Liferay DXP 资源管理错误漏洞 — Portal 7.5 -2025-09-12
CVE-2025-59139 Hono has Body Limit Middleware Bypass — hono 5.3 Medium2025-09-12
CVE-2025-48040 Malicious Key Exchange Messages may Lead to Excessive Resource Consumption — OTP 7.5AIHighAI2025-09-11
CVE-2025-20340 Cisco IOS XR Address Resolution Protocol Broadcast Storm Vulnerability — Cisco IOS XR Software 7.4 High2025-09-10
CVE-2025-49460 Zoom Workplace Clients - Argument Injection — Zoom Workplace Clients 4.3 Medium2025-09-09
CVE-2025-40802 Siemens RUGGEDCOM RST2428P 资源管理错误漏洞 — RUGGEDCOM RST2428P 3.1 Low2025-09-09
CVE-2025-58369 fs2: Half-shutdown of socket during TLS handshake may result in spin loop on opposite side — fs2 5.3 Medium2025-09-05
CVE-2025-43772 Liferay Portal和Liferay DXP 资源管理错误漏洞 — Portal 9.1AICriticalAI2025-09-04
CVE-2025-58157 gnark affected by denial of service when computing scalar multiplication using fake-GLV algorithm — gnark 7.5 High2025-08-29
CVE-2025-29898 Qsync Central — Qsync Central 7.5 -2025-08-29
CVE-2025-9341 Garbage collection can delay for AES CBC Native support, resulting in heap exhaustion — Bouncy Castle for Java FIPS 7.5AIHighAI2025-08-22
CVE-2025-57751 Denial-of-Service attack in pyLoad CNL Blueprint using dukpy.evaljs — pyload 6.5AIMediumAI2025-08-21
CVE-2025-48956 vLLM API endpoints vulnerable to Denial of Service Attacks — vllm 7.5 High2025-08-21
CVE-2025-5115 MadeYouReset HTTP/2 vulnerability — Eclipse Jetty 7.5AIHighAI2025-08-20
CVE-2025-8449 Schneider Electric多款产品 资源管理错误漏洞 — EcoStruxure Building Operation Enterprise Server 6.5AIMediumAI2025-08-20
CVE-2025-9092 Hybrid Module Deployment in Multi-JVM Environments Leading to Resource Exhaustion — Bouncy Castle for Java - BC-FJA 2.1.0 7.5AIHighAI2025-08-16
CVE-2025-54472 Apache bRPC: Redis Parser Remote Denial of Service — Apache bRPC 7.5AIHighAI2025-08-14
CVE-2025-55197 pypdf's Manipulated FlateDecode streams can exhaust RAM — pypdf 6.5AIMediumAI2025-08-13
CVE-2025-53722 Windows Remote Desktop Services Denial of Service Vulnerability — Windows 10 Version 1507 7.5 High2025-08-12
CVE-2025-40766 Siemens SINEC Traffic Analyzer 资源管理错误漏洞 — SINEC Traffic Analyzer 5.5 Medium2025-08-12
CVE-2025-55152 oak: ReDoS in x-forwarded-proto and x-forwarded-for headers — oak 5.3 Medium2025-08-09
CVE-2025-54884 Vision UI security-kit.js: Potential Uncontrolled Resource Allocation Vulnerability — Vision-ui 7.5AIHighAI2025-08-05
CVE-2025-54796 Copyparty is vulnerable to Regex Denial of Service (ReDoS) attacks through "Recent Uploads" page — copyparty 7.5 High2025-08-01

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.