File tree Expand file tree Collapse file tree 1 file changed +5
-1
lines changed
Expand file tree Collapse file tree 1 file changed +5
-1
lines changed Original file line number Diff line number Diff line change @@ -118,8 +118,12 @@ does not trust is considered a vulnerability:
118118 * The memory leak is directly exploitable by an untrusted source without requiring application mistakes
119119 * The leak cannot be reasonably mitigated through standard operational practices (like process recycling)
120120 * The leak occurs deterministically under normal usage patterns rather than edge cases
121- * The leak occurs at a rate that would cause practical resource exhaustion within X requests or Y hours under
121+ * The leak occurs at a rate that would cause practical resource exhaustion within a practical timeframe under
122122 typical workloads
123+ * The attack demonstrates [ asymmetric resource consumption] ( https://cwe.mitre.org/data/definitions/405.html ) ,
124+ where the attacker expends significantly fewer resources than what's required by the server to process the
125+ attack. Attacks requiring comparable resources on the attacker's side (which can be mitigated through common
126+ practices like rate limiting) may not qualify
123127
124128If Node.js loads configuration files or runs code by default (without a
125129specific request from the user), and this is not documented, it is considered a
You can’t perform that action at this time.
0 commit comments