Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-770 (不加限制或调节的资源分配) — Vulnerability Class 827

827 vulnerabilities classified as CWE-770 (不加限制或调节的资源分配). AI Chinese analysis included.

CWE-770 represents a critical resource management weakness where software allocates reusable resources, such as memory, file descriptors, or database connections, without enforcing limits or throttling mechanisms. This vulnerability typically arises when applications accept untrusted input or handle high-volume requests, allowing malicious actors to trigger excessive resource consumption. By rapidly requesting numerous resources, attackers can exhaust system capacity, leading to denial-of-service conditions that degrade performance or crash the entire service. To mitigate this risk, developers must implement strict quotas, rate limiting, and connection pooling strategies. Enforcing maximum thresholds for resource allocation ensures that no single user or process can monopolize system assets, thereby maintaining stability and availability even under heavy load or targeted abuse attempts.

MITRE CWE Description
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Common Consequences (1)
AvailabilityDoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
When allocating resources without limits, an attacker could prevent other systems, applications, or processes from accessing the same type of resource. It can be easy for an attacker to consume many resources by rapidly making many requests or causing larger resources to be used than is needed.
Mitigations (5)
RequirementsClearly specify the minimum and maximum expectations for capabilities, and dictate which behaviors are acceptable when resource allocation reaches limits.
Architecture and DesignLimit the amount of resources that are accessible to unprivileged users. Set per-user limits for resources. Allow the system administrator to define these limits. Be careful to avoid CWE-410.
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place, and it will help the administrator to identify who is committing the abuse. The login application should be protected …
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
Examples (2)
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
In the following example a server socket connection is used to accept a request to store data on the local file system using a specified filename. The method openSocketConnection establishes a server socket to accept requests from a client. When a client establishes a connection to this service the getNextMessage method is first used to retrieve from the socket the name of the file to store the da…
int writeDataFromSocketToFile(char *host, int port) { char filename[FILENAME_SIZE]; char buffer[BUFFER_SIZE]; int socket = openSocketConnection(host, port); if (socket < 0) { printf("Unable to open socket connection"); return(FAIL); } if (getNextMessage(socket, filename, FILENAME_SIZE) > 0) { if (openFileToWrite(filename) > 0) { while (getNextMessage(socket, buffer, BUFFER_SIZE) > 0){ if (!(writeToFile(buffer) > 0)) break; } } closeFile(); } closeSocket(socket); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2023-25578 Starlite DoS vulnerability when parsing multipart request body — starlite 7.5 High2023-02-15
CVE-2023-25156 Kiwi TCMS has no protection against brute-force attacks on login page — kiwi 7.5 High2023-02-15
CVE-2023-25171 Kiwi TCMS has denial of service vulnerability on Password reset page — kiwi 7.5 High2023-02-15
CVE-2023-25577 Werkzeug may allow high resource usage when parsing multipart form data with many fields — werkzeug 7.5 High2023-02-14
CVE-2023-25576 @fastify/multipart vulnerable to DoS due to unlimited number of parts — fastify-multipart 7.5 High2023-02-14
CVE-2023-22323 BIG-IP SSL OCSP Authentication profile vulnerability — BIG-IP 7.5 High2023-02-01
CVE-2023-23846 Open5GS 安全漏洞 — Open5GS 7.5 -2023-02-01
CVE-2023-22740 Discourse vulnerable to Allocation of Resources Without Limits via Chat drafts — discourse 4.3 Medium2023-01-27
CVE-2023-22739 Discourse subject to Allocation of Resources Without Limits or Throttling — discourse 6.5 Medium2023-01-26
CVE-2023-22397 Junos OS Evolved: PTX10003: An attacker sending specific genuine packets will cause a memory leak in the PFE leading to a Denial of Service — Junos OS Evolved 6.1 Medium2023-01-12
CVE-2023-22403 Junos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic — Junos OS 7.5 High2023-01-12
CVE-2022-4723 Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb — ikus060/rdiffweb 9.1 -2022-12-23
CVE-2022-41288 Siemens部分产品 安全漏洞 — JT2Go 3.3 Low2022-12-13
CVE-2022-46159 Any authenticated Discourse user can create an unlisted topic — discourse 4.3 Medium2022-12-02
CVE-2022-4045 Authenticated user could send multiple requests containing a parameter which could fetch a large amount of data and can crash a Mattermost server — Mattermost 3.1 Low2022-11-23
CVE-2022-4044 Authenticated user could send multiple requests containing a large Auto Responder Message payload and can crash a Mattermost server — Mattermost 4.3 Medium2022-11-23
CVE-2022-4019 Authenticated user could send multiple requests containing a large payload to a Playbooks API and can crash a Mattermost server — Playbooks Plugin 4.3 Medium2022-11-23
CVE-2022-45471 JetBrains Hub 安全漏洞 — Hub 3.5 Low2022-11-18
CVE-2022-3480 Denial-of-Service vulnerability in PHOENIX CONTACT mGuard product family — FL MGUARD CENTERPORT 7.5 High2022-11-15
CVE-2022-20950 Cisco Firepower Threat Defense 代码问题漏洞 — Cisco Firepower Threat Defense Software 5.8 Medium2022-11-10
CVE-2021-34568 WAGO I/O-Check Service prone to Allocation of Resources Without Limits or Throttling — 750-81xx/xxx-xxxFW 7.5 High2022-11-09
CVE-2022-34439 Dell PowerScale OneFS 安全漏洞 — PowerScale OneFS 5.3 Medium2022-10-21
CVE-2022-3439 Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb — ikus060/rdiffweb 9.1 -2022-10-14
CVE-2022-3456 Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb — ikus060/rdiffweb 9.1 -2022-10-13
CVE-2022-3423 Allocation of Resources Without Limits or Throttling in nocodb/nocodb — nocodb/nocodb 7.3 High2022-10-07
CVE-2022-3273 Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb — ikus060/rdiffweb 9.1 -2022-10-06
CVE-2022-3371 No limit in length of "Token name" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb — ikus060/rdiffweb 9.1 -2022-09-30
CVE-2022-3364 No limit in length of "Fullname" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb — ikus060/rdiffweb 9.1 -2022-09-29
CVE-2022-39226 Discourse user profile location and website fields were not sufficiently length-limited — discourse 4.3 Medium2022-09-29
CVE-2022-3298 Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb — ikus060/rdiffweb 9.1 -2022-09-26

Vulnerabilities classified as CWE-770 (不加限制或调节的资源分配) represent 827 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.