目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-770 不加限制或调节的资源分配 类漏洞列表 827

CWE-770 不加限制或调节的资源分配 类弱点 827 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-770 属于资源管理缺陷,指系统在分配可复用资源时未实施限制或节流措施。攻击者通常通过发送大量请求耗尽系统资源,导致拒绝服务或性能瘫痪。开发者应通过设置并发上限、实施速率限制及监控资源使用率来缓解风险,确保关键资源分配受到严格管控,防止恶意滥用。

MITRE CWE 官方描述
CWE:CWE-770 未限制或未节流地分配资源(Allocation of Resources Without Limits or Throttling) 英文:产品代表某个行为者(actor)分配可重用资源或一组资源时,未对可分配资源的大小或数量施加任何预期的限制。
常见影响 (1)
AvailabilityDoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
When allocating resources without limits, an attacker could prevent other systems, applications, or processes from accessing the same type of resource. It can be easy for an attacker to consume many resources by rapidly making many requests or causing larger resources to be used than is needed.
缓解措施 (5)
RequirementsClearly specify the minimum and maximum expectations for capabilities, and dictate which behaviors are acceptable when resource allocation reaches limits.
Architecture and DesignLimit the amount of resources that are accessible to unprivileged users. Set per-user limits for resources. Allow the system administrator to define these limits. Be careful to avoid CWE-410.
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place, and it will help the administrator to identify who is committing the abuse. The login application should be protected …
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
代码示例 (2)
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
In the following example a server socket connection is used to accept a request to store data on the local file system using a specified filename. The method openSocketConnection establishes a server socket to accept requests from a client. When a client establishes a connection to this service the getNextMessage method is first used to retrieve from the socket the name of the file to store the da…
int writeDataFromSocketToFile(char *host, int port) { char filename[FILENAME_SIZE]; char buffer[BUFFER_SIZE]; int socket = openSocketConnection(host, port); if (socket < 0) { printf("Unable to open socket connection"); return(FAIL); } if (getNextMessage(socket, filename, FILENAME_SIZE) > 0) { if (openFileToWrite(filename) > 0) { while (getNextMessage(socket, buffer, BUFFER_SIZE) > 0){ if (!(writeToFile(buffer) > 0)) break; } } closeFile(); } closeSocket(socket); }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2025-32952 Jmix 安全漏洞 — jmix 6.5 Medium2025-04-22
CVE-2025-3734 Drupal Stage File Proxy 安全漏洞 — Stage File Proxy 7.5AIHighAI2025-04-16
CVE-2025-0122 Palo Alto Networks Prisma SD-WAN ION 安全漏洞 — Prisma SD-WAN 6.5AIMediumAI2025-04-11
CVE-2024-51461 IBM QRadar WinCollect Agent 安全漏洞 — QRadar WinCollect Agent 4.3 Medium2025-04-11
CVE-2025-29917 Suricata 安全漏洞 — suricata 6.2 Medium2025-04-10
CVE-2025-29916 Suricata 安全漏洞 — suricata 6.2 Medium2025-04-10
CVE-2025-1677 GitLab Enterprise Edition(EE)和GitLab Community Edition(CE) 安全漏洞 — GitLab 6.5 Medium2025-04-10
CVE-2025-26480 Dell PowerScale OneFS 安全漏洞 — PowerScale OneFS 5.3 Medium2025-04-10
CVE-2025-3475 Drupal WEB-T 安全漏洞 — WEB-T 7.5AIHighAI2025-04-09
CVE-2025-32380 Apollo Router Core 安全漏洞 — router 7.5 High2025-04-09
CVE-2025-32381 XGrammar 安全漏洞 — xgrammar 6.5 Medium2025-04-09
CVE-2025-32374 DNN 安全漏洞 — Dnn.Platform 5.9 Medium2025-04-09
CVE-2025-26682 Microsoft ASP.NET Core 安全漏洞 — ASP.NET Core 8.0 7.5 High2025-04-08
CVE-2025-32025 imagemeta 安全漏洞 — imagemeta 7.5AIHighAI2025-04-08
CVE-2025-32024 imagemeta 安全漏洞 — imagemeta 7.5AIHighAI2025-04-08
CVE-2025-32034 Apollo Router Core 安全漏洞 — router 7.5 High2025-04-07
CVE-2025-32032 Apollo Router Core 安全漏洞 — router 7.5 High2025-04-07
CVE-2025-32031 Apollo Federation 安全漏洞 — federation 7.5 High2025-04-07
CVE-2025-32030 Apollo Federation 安全漏洞 — federation 7.5 High2025-04-07
CVE-2025-31496 apollo-rs 安全漏洞 — apollo-rs 7.5 High2025-04-07
CVE-2025-24317 JTEKT ELECTRONICS HMI ViewJet C-more 安全漏洞 — HMI ViewJet C-more series 7.5AIHighAI2025-04-04
CVE-2025-32049 libsoup 安全漏洞 7.5 High2025-04-03
CVE-2024-45700 Zabbix 安全漏洞 — Zabbix 7.5AIHighAI2025-04-02
CVE-2025-27556 Django 安全漏洞 — Django 5.8 Medium2025-04-02
CVE-2024-10307 GitLab Enterprise Edition(EE)和GitLab Community Edition(CE) 安全漏洞 — GitLab 4.3 Medium2025-03-28
CVE-2025-30350 Directus 安全漏洞 — directus 5.3 Medium2025-03-26
CVE-2025-30225 Directus 安全漏洞 — directus 5.3 Medium2025-03-26
CVE-2025-2559 Keycloak 安全漏洞 4.9 Medium2025-03-25
CVE-2024-45484 B&R Industrial Automation B&R APROL 安全漏洞 — APROL 6.5AIMediumAI2025-03-25
CVE-2024-10650 ChuanhuChatGPT 安全漏洞 — gaizhenbiao/chuanhuchatgpt 7.5 -2025-03-20

CWE-770(不加限制或调节的资源分配) 是常见的弱点类别,本平台收录该类弱点关联的 827 条 CVE 漏洞。