This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Early Amplification"
From OWASP
Weilin Zhong (talk | contribs) |
Weilin Zhong (talk | contribs) |
||
Line 15: | Line 15: | ||
==Related Vulnerabilities== | ==Related Vulnerabilities== | ||
+ | |||
[[Lack of Authentication]] | [[Lack of Authentication]] | ||
+ | |||
[[Lack of Access Control]] | [[Lack of Access Control]] | ||
==Related Countermeasures== | ==Related Countermeasures== | ||
+ | |||
[[:Category:Authentication]] | [[:Category:Authentication]] | ||
+ | |||
[[:Category:Access Control]] | [[:Category:Access Control]] | ||
Revision as of 17:21, 9 June 2006
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Description
Allows a legitimatebut expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.
Examples
Related Threats
- Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
Related Attacks
Related Vulnerabilities
Related Countermeasures
Categories
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.