🚀 Join our AI Wargame at Black Hat Asia and our Workshop + Wargame at NDC Sydney .


Denial Of Service

Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources.

Remediation

  • Design throttling mechanisms into the system architecture.
  • Ensure that protocols have specific limits of scale placed on them.

Metadata

  • Severity: medium
  • Slug: denial-of-service

CWEs

  • 400: Uncontrolled Resource Consumption

OWASP

  • A05:2021: Security Misconfiguration
  • SC10:2025: Denial Of Service

Available Labs

Open Artificial Intelligence labs in SecDim Play for this vulnerability.

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more