Description: Uncontrolled resource consumption is a vulnerability that allows an attacker to exhaust a system’s resources, such as CPU, memory, bandwidth, or storage, potentially leading to a denial of service (DoS). This vulnerability manifests when a system does not adequately implement limits or controls on its resource usage, allowing a malicious user or unauthorized process to consume resources excessively. The main characteristics of this vulnerability include a lack of input validation, absence of limits on resource requests, and inability to properly manage workloads. The relevance of uncontrolled resource consumption lies in its potential to affect the availability of critical services, which can lead to economic losses and damage to organizations’ reputations. Furthermore, this type of vulnerability is common in various computing environments, including web applications, cloud services, and distributed systems, where scalability and efficiency are essential. Detecting and mitigating this vulnerability is crucial to ensuring the stability and security of computer systems, which involves implementing secure programming practices and continuously monitoring resource usage.