Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-53012 MaterialX's Lack of Import Depth Limit Leads to DoS (Denial-Of-Service) Via Stack Exhaustion — MaterialX 7.5 -2025-08-01
CVE-2025-54575 ImageSharp Triggers an Infinite Loop in its GIF Decoder When Skipping Malformed Comment Extension Blocks — ImageSharp 5.3 Medium2025-07-30
CVE-2025-54572 Ruby SAML DOS vulnerability with large SAML response — ruby-saml 7.5AIHighAI2025-07-30
CVE-2025-41677 Resource Exhaustion via POST Requests to send-mail Action — mbNET.mini 4.9 Medium2025-07-21
CVE-2025-41676 Resource Exhaustion via POST Requests to send-sms Action — mbNET.mini 4.9 Medium2025-07-21
CVE-2025-50057 Extension - rsjoomla.com - DOS vulnerability RSFiles! component 1.16.3-1.17.7 for Joomla — RSFiles! component for Joomla 7.5 -2025-07-18
CVE-2025-53893 File Browser Vulnerable to Uncontrolled Memory Consumption Due to Oversized File Processing — filebrowser 6.5AIMediumAI2025-07-15
CVE-2025-48795 Apache CXF: Denial of Service and sensitive data exposure in logs — Apache CXF 5.5 -2025-07-15
CVE-2025-53636 Open OnDemand Shell App closed websocket DoS — ondemand 5.4 Medium2025-07-11
CVE-2025-53506 Apache Tomcat: DoS via excessive h2 streams at connection start — Apache Tomcat 7.5 -2025-07-10
CVE-2025-53371 DiscordNotifications allows DOS, SSRF, and possible RCE through requests to user-controlled URLs — DiscordNotifications 9.1 Critical2025-07-10
CVE-2025-49722 Windows Print Spooler Denial of Service Vulnerability — Windows 10 Version 1507 5.7 Medium2025-07-08
CVE-2025-49716 Windows Netlogon Denial of Service Vulnerability — Windows Server 2008 R2 Service Pack 1 7.5 High2025-07-08
CVE-2025-6712 MongoDB Server may be susceptible to DoS due to Accumulated Memory Allocation — MongoDB Server 6.5 Medium2025-07-07
CVE-2025-53481 Denial of service vector on ipinfo/v0/norevision — Mediawiki - IPInfo Extension 7.5 -2025-07-04
CVE-2025-49595 n8n Vulnerable to Denial of Service via Malformed Binary Data Requests — n8n 4.9 Medium2025-07-03
CVE-2025-6817 HDF5 H5Centry.c H5C__load_entry resource consumption — HDF5 3.3 Low2025-06-28
CVE-2025-52887 cpp-httplib has unlimited number of http header fields, which causes memory leak — cpp-httplib 7.5 High2025-06-26
CVE-2025-6365 HobbesOSR Kitten pgtable.h set_pte_at resource consumption — Kitten 5.7 Medium2025-06-20
CVE-2025-6274 WebAssembly wabt binary-reader-interp.cc OnDataCount resource consumption — wabt 3.3 Low2025-06-19
CVE-2025-49763 Apache Traffic Server: Remote DoS via memory exhaustion in ESI Plugin — Apache Traffic Server 7.5AIHighAI2025-06-19
CVE-2025-6140 spdlog pattern_formatter-inl.h scoped_padder resource consumption — spdlog 3.3 Low2025-06-16
CVE-2025-3526 Liferay Portal和Liferay DXP 资源管理错误漏洞 — Portal 7.5AIHighAI2025-06-16
CVE-2025-3602 Liferay Portal和Liferay DXP 资源管理错误漏洞 — Portal 7.5AIHighAI2025-06-16
CVE-2025-33068 Windows Standards-Based Storage Management Service Denial of Service Vulnerability — Windows Server 2012 R2 7.5 High2025-06-10
CVE-2025-32724 Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability — Windows 10 Version 1507 7.5 High2025-06-10
CVE-2025-3112 Schneider Electric Modicon Controllers 资源管理错误漏洞 — Modicon Controllers M241/M251 6.5 Medium2025-06-10
CVE-2025-48053 Discourse vulnerable to DoS via large URL payload in PM to a bot — discourse 4.3AIMediumAI2025-06-09
CVE-2025-25208 Rhcl: authorino denial of service through authpolicy with sharedsecretref severity 5.7 Medium2025-06-09
CVE-2025-41361 Uncontrolled resource consumption vulnerability in IDF and ZLF — IDF and ZLF 7.5AIHighAI2025-06-06

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.