By repeatedly requesting a feature that consumes a lot of memory, attackers can constantly occupy an important part of an application's hosting server memory. Depending on the application's deployment architecture, hosting server resources and attackers' capabilities, this can lead to an exhaustion of the available server's memory.