The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. If the loop can be influenced by an attacker, this weakness could allow
attackers to consume excessive resources such as CPU or memory. An infinite loop will cause unexpected consumption of resources, such as
CPU cycles or memory. The software's operation may slow down, or cause a
long time to respond.
Latest vulnerabilities for CWE-835
Description of CWE-835 on Mitre website