This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Early Amplification"
From OWASP
Line 53: | Line 53: | ||
TBD | TBD | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
__NOTOC__ | __NOTOC__ | ||
Line 86: | Line 61: | ||
[[Category:Access Control]] | [[Category:Access Control]] | ||
[[Category:Access Control Vulnerability]] | [[Category:Access Control Vulnerability]] | ||
+ | [[Category:Authentication Vulnerability]] |
Revision as of 23:33, 23 September 2008
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
Last revision (mm/dd/yy): 09/23/2008
Vulnerabilities Table of Contents
Description
Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.
- Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
Risk Factors
TBD
Examples
TBD
Related Attacks
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
TBD