Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-459 (清理环节不完整) — Vulnerability Class 51

51 vulnerabilities classified as CWE-459 (清理环节不完整). AI Chinese analysis included.

CWE-459 represents a resource management weakness where software fails to properly release temporary or supporting resources after their intended use. This oversight typically leads to resource exhaustion, such as memory leaks, file descriptor saturation, or disk space depletion, which can degrade system performance or cause denial-of-service conditions. Attackers often exploit this by repeatedly triggering operations that allocate resources without releasing them, effectively starving the system of necessary assets. To mitigate this risk, developers must implement rigorous cleanup protocols, ensuring that all allocated resources are explicitly freed or closed within finally blocks or using automatic resource management constructs like context managers. Adhering to strict lifecycle management practices and conducting thorough code reviews helps prevent these leaks, maintaining system stability and security integrity.

MITRE CWE Description
The product does not properly "clean up" and remove temporary or supporting resources after they have been used.
Common Consequences (1)
Other, Confidentiality, IntegrityOther, Read Application Data, Modify Application Data, DoS: Resource Consumption (Other)
It is possible to overflow the number of temporary files because directories typically have limits on the number of files allowed. This could create a denial of service problem.
Mitigations (1)
Architecture and Design, ImplementationTemporary files and other supporting resources should be deleted/released immediately after they are no longer needed.
Examples (1)
Stream resources in a Java application should be released in a finally block, otherwise an exception thrown before the call to close() would result in an unreleased I/O resource. In the example below, the close() method is called in the try block (incorrect).
try { InputStream is = new FileInputStream(path); byte b[] = new byte[is.available()]; is.read(b); is.close(); } catch (Throwable t) { log.error("Something bad happened: " + t.getMessage()); }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2025-66467 Apache CloudStack: MinIO policy remains intact on bucket deletion — Apache CloudStack 8.0 High2026-05-08
CVE-2026-28268 Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse — vikunja 9.8 Critical2026-02-27
CVE-2026-3304 Multer vulnerable to Denial of Service via incomplete cleanup — multer 7.5 -2026-02-27
CVE-2026-28196 JetBrains TeamCity 安全漏洞 — TeamCity 2.3 Low2026-02-25
CVE-2025-15331 Tanium addressed an uncontrolled resource consumption vulnerability in Connect. — Connect 4.3 Medium2026-02-05
CVE-2025-66675 Apache Struts: File leak in multipart request processing causes disk exhaustion (DoS) - version ranges fixed — Apache Struts 7.5AIHighAI2025-12-10
CVE-2025-64775 Apache Struts: File leak in multipart request processing causes disk exhaustion (DoS) — Apache Struts 7.5 -2025-12-01
CVE-2025-29934 AMD CPU 安全漏洞 — AMD EPYC™ 9004 Series Processors 5.3 Medium2025-11-21
CVE-2025-6338 Possible denial of service with multiple incoming connections to a Schannel based server with a TLS backend — Qt 7.5AIHighAI2025-10-16
CVE-2025-59781 BIG-IP DNS cache vulnerability — BIG-IP 7.5 High2025-10-15
CVE-2025-20293 Cisco IOS XE Software 安全漏洞 — Cisco IOS XE Software 5.3 Medium2025-09-24
CVE-2025-0032 AMD多款产品 安全漏洞 — AMD EPYC™ 9005 Series Processors 7.2 High2025-09-06
CVE-2024-21977 AMD多款产品 安全漏洞 — AMD EPYC™ 7003 Series Processors 3.2 Low2025-09-05
CVE-2025-43711 Tunnelblick 安全漏洞 — Tunnelblick 8.1 High2025-07-04
CVE-2023-29184 Fortinet FortiOS和Fortinet FortiProxy 安全漏洞 — FortiProxy 3.1 Low2025-06-10
CVE-2025-31650 Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame — Apache Tomcat 7.5AIHighAI2025-04-28
CVE-2025-2260 Eclipse ThreadX NetX Duo HTTP component server denial of service — ThreadX 7.5AIHighAI2025-04-06
CVE-2024-50385 STMicroelectronics X-CUBE-AZRTOS-WL 安全漏洞 — X-CUBE-AZRT-H7RS 6.5 Medium2025-04-02
CVE-2024-50384 STMicroelectronics X-CUBE-AZRTOS-WL 安全漏洞 — X-CUBE-AZRT-H7RS 6.5 Medium2025-04-02
CVE-2024-36353 AMD Radeon 安全漏洞 — AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics 6.5 Medium2025-03-02
CVE-2025-0726 Eclipse ThreadX NetX Duo HTTP server denial of service — ThreadX 7.5 -2025-02-21
CVE-2024-53881 NVIDIA vGPU software 安全漏洞 — NVIDIA vGPU software 5.5 Medium2025-01-28
CVE-2024-53869 NVIDIA Unified Memory driver 安全漏洞 — NVIDIA GPU Display Driver, vGPU software 5.5 Medium2025-01-28
CVE-2025-0473 Incomplete Cleanup vulnerability in PMB platform — PMB platform 6.5 Medium2025-01-16
CVE-2025-21609 SiYuan has an arbitrary file deletion vulnerability — siyuan 8.1 -2025-01-03
CVE-2024-45445 Huawei HarmonyOS 安全漏洞 — HarmonyOS 4.0 Medium2024-09-04
CVE-2023-31356 AMD Secure Processor和AMD Secure Encrypted Virtualization 安全漏洞 — AMD EPYC™ 7003 Processors 4.4 Medium2024-08-13
CVE-2024-6300 Incomplete Cleanup in Conduit — Conduit 3.7 Low2024-06-25
CVE-2024-20303 Cisco IOS XE Software 安全漏洞 — Cisco IOS XE Software 7.4 High2024-03-27
CVE-2024-23672 Apache Tomcat: WebSocket DoS with incomplete closing handshake — Apache Tomcat 7.5AIHighAI2024-03-13

Vulnerabilities classified as CWE-459 (清理环节不完整) represent 51 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.