CWE-400: Resource Exhaustion
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, leading to exhaustion.
Yearly Trend
Top Affected Vendors
All Resource Exhaustion CVEs (689)
An unauthenticated attacker can exploit this vulnerability in Veal98 Echo Open-Source Community System to send email verification messages to arbitrar...
Nov 25, 2025This vulnerability in Free5GC allows attackers to cause denial of service by sending specially crafted POST requests to the Nnssf_NSSAIAvailability AP...
Nov 24, 2025An unauthenticated remote denial-of-service vulnerability in HPE web management interfaces allows attackers to crash affected systems, requiring manua...
Nov 18, 2025This vulnerability allows remote attackers to brute-force predictable MD5 tokens used for critical user workflows like password resets and email confi...
Nov 18, 2025A vulnerability in dvsekhvalnov jose2go library versions 1.5.0 through 1.7.0 allows attackers to cause Denial-of-Service (DoS) by sending specially cr...
Nov 12, 2025Open5GS AMF crashes when receiving a malformed NGSetupRequest message, causing denial of service for 5G core network users. This affects all deploymen...
Nov 10, 2025A vulnerability in KiloView Dual Channel 4k HDMI & 3G-SDI HEVC Video Encoder firmware allows remote attackers to cause denial of service through the s...
Nov 6, 2025This vulnerability allows attackers to perform a Slowloris-style Denial-of-Service attack against Summer Pearl Group Vacation Rental Management Platfo...
Oct 31, 2025This vulnerability allows attackers to flood caches with excessive data through API requests, causing legitimate cache entries to be evicted. This can...
Oct 31, 2025LibreChat 0.7.9 is vulnerable to denial of service attacks through the /api/memories endpoint. Attackers can submit arbitrarily large 'key' or 'value'...
Oct 31, 2025This vulnerability in Bitcoin Core allows attackers to cause uncontrolled resource consumption (denial of service) by exploiting a flaw in how the sof...
Oct 28, 2025This vulnerability in Prevx v3.0.5.220 allows attackers to cause denial of service by sending a specific IOCTL code to the pxscan.sys driver, which te...
Oct 28, 2025This vulnerability allows remote attackers to perform denial-of-service attacks against Liferay Portal/DXP by sending Headless API requests that retur...
Oct 27, 2025This vulnerability in CAPEv2 allows attackers who can submit samples to cause denial-of-analysis by generating deeply nested or oversized behavior dat...
Oct 20, 2025A missing NULL pointer check in Samsung Exynos processors allows attackers to cause Denial of Service by sending malformed MM (Mobility Management) pa...
Oct 20, 2025OpenBao versions before 2.4.1 have a memory exhaustion vulnerability where specially crafted JSON payloads can cause disproportionate memory consumpti...
Oct 17, 2025This vulnerability in kafka-ui versions 0.6.0 through 0.7.2 allows attackers to cause a Denial of Service (DoS) by uploading a specially crafted confi...
Oct 14, 2025This vulnerability in Windows Remote Procedure Call allows unauthorized attackers to cause denial of service by consuming excessive system resources. ...
Oct 14, 2025An unauthenticated attacker can flood Juniper Junos Space with HTTP API requests, consuming all file handles and causing a complete denial of service....
Oct 9, 2025This vulnerability in Rack's multipart parser allows remote attackers to cause denial of service by sending incomplete multipart headers that trigger ...
Oct 7, 2025This vulnerability in Rack (Ruby web server interface) allows remote attackers to cause denial of service through memory exhaustion. By sending multip...
Oct 7, 2025This vulnerability allows remote attackers to cause a Denial of Service (DoS) on TCL Smart TVs by flooding the UPnP/DLNA MediaRenderer with malformed ...
Oct 3, 2025The AT_NA2000 PLC from Nanda Automation Technology has a TCP implementation flaw that violates RFC5961 by accepting RST packets with sequence numbers ...
Sep 29, 2025A Denial of Service vulnerability exists in TensorFlow v2.18.0 where using 'valid' padding in tf.keras.layers.Conv2D operations can cause resource exh...
Sep 25, 2025A vulnerability in O-RAN Near Realtime RIC ric-plt-submgr allows remote attackers to cause denial of service via crafted requests to the Subscription ...
Sep 25, 2025A vulnerability in PyTorch's torch.linalg.lu component allows attackers to trigger a Denial of Service (DoS) through specific slice operations. This a...
Sep 25, 2025This vulnerability in Apache IoTDB is an uncontrolled resource consumption issue (CWE-400) that could allow attackers to cause denial of service. It a...
Sep 24, 2025This CVE describes a Regular Expression Denial of Service (ReDoS) vulnerability in the huggingface/transformers library's AdamWeightDecay optimizer. A...
Sep 23, 2025This vulnerability allows remote attackers to perform denial-of-service attacks on Liferay Portal/DXP by exploiting GraphQL queries that return unlimi...
Sep 12, 2025A vulnerability in Open5GS allows remote attackers to cause denial of service by sending a specially crafted Create Session Request message to the SMF...
Sep 9, 2025This vulnerability in Open5GS allows attackers to cause denial of service by triggering an assertion failure through repeated UE connect/disconnect me...
Sep 8, 2025This CVE describes a denial of service vulnerability affecting Android Pixel devices. Attackers can exploit this vulnerability to cause system instabi...
Sep 4, 2025An integer overflow and invalid input vulnerability in rust-ffmpeg's cached method allows attackers to cause denial of service or potentially execute ...
Sep 2, 2025A denial of service vulnerability exists in gnark versions 0.12.0 where the fake-GLV algorithm for scalar multiplication fails to converge quickly for...
Aug 29, 2025This vulnerability allows unauthenticated attackers to cause a Denial of Service (DoS) on Reolink video doorbells by flooding the RTMP server with sim...
Aug 22, 2025This vulnerability in Eclipse Jetty allows HTTP/2 clients to trigger resource exhaustion attacks by sending malformed frames that force the server to ...
Aug 20, 2025This vulnerability allows attackers to cause denial-of-service through memory exhaustion in Firefox and Thunderbird's WebRender graphics component. It...
Aug 19, 2025This vulnerability in Firefox for iOS allows malicious scripts to bypass the popup blocker, enabling attackers to open excessive new tabs. This could ...
Aug 19, 2025This buffer overflow vulnerability in TOTOLINK A3002R routers allows attackers to cause Denial of Service by sending specially crafted input to the fw...
Aug 18, 2025This CVE describes a buffer overflow vulnerability in the TOTOLINK A3002R router's web interface. Attackers can send specially crafted requests to the...
Aug 18, 2025CVE-2025-55197 is a denial-of-service vulnerability in pypdf where specially crafted PDF files with malicious FlateDecode filters can cause RAM exhaus...
Aug 13, 2025This vulnerability allows an unauthorized attacker to cause a denial-of-service condition in Windows Remote Desktop Services by consuming excessive re...
Aug 12, 2025Copyparty versions before 1.18.9 have a vulnerability where the filter parameter on the 'Recent Uploads' page accepts arbitrary regular expressions. W...
Aug 2, 2025CVE-2025-53012 is a denial-of-service vulnerability in MaterialX library versions before 1.39.3 where unlimited nested file imports can cause stack ex...
Aug 1, 2025A memory handling vulnerability in Suricata's HTTP/2 parser allows uncontrolled memory consumption when processing data on stream 0. This can lead to ...
Jul 22, 2025This vulnerability in TRENDnet TPL-430AP access points allows denial-of-service attacks when the USERLIMIT_GLOBAL option is set to 0 in bftpd configur...
Jul 21, 2025This vulnerability allows attackers to cause denial of service by sending specially crafted DNS packets with highly compressed domain names. When pars...
Jul 12, 2025This vulnerability allows an attacker to cause a denial-of-service (DoS) condition in Apache Tomcat by exploiting an HTTP/2 protocol flaw. An uncooper...
Jul 10, 2025This vulnerability allows unauthenticated remote attackers to cause denial of service in Zimbra Collaboration Suite by sending specially crafted GET r...
Jul 9, 2025This vulnerability in Windows Netlogon allows unauthorized attackers to cause denial of service by consuming excessive resources. It affects Windows s...
Jul 8, 2025About Resource Exhaustion (CWE-400)
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, leading to exhaustion.
Our database tracks 689 CVEs classified as CWE-400, with 21 rated critical and 449 rated high severity. The average CVSS score for Resource Exhaustion vulnerabilities is 7.0.
External reference: View CWE-400 on MITRE CWE →
Monitor Resource Exhaustion Vulnerabilities
Get alerted when new Resource Exhaustion CVEs affect your infrastructure.
Start Monitoring Free