🎄 Join our Annual Holiday wargame and win prizes!


Denial Of Service

Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources.

Remediation

  • Design throttling mechanisms into the system architecture.
  • Ensure that protocols have specific limits of scale placed on them.

Metadata

  • Severity: medium
  • Slug: denial-of-service

CWEs

  • 400: Uncontrolled Resource Consumption

OWASP

  • A05:2021: Security Misconfiguration
  • SC10:2025: Denial Of Service
Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more