This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Early Amplification"
From OWASP
Weilin Zhong (talk | contribs) |
Weilin Zhong (talk | contribs) |
||
Line 22: | Line 22: | ||
==Categories== | ==Categories== | ||
− | [[Category:Access Control | + | [[Category:Access Control Vulnerability]] |
{{Template:Stub}} | {{Template:Stub}} |
Revision as of 17:41, 12 June 2006
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Description
Allows a legitimatebut expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.
Examples
Related Threats
- Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
Related Attacks
Related Countermeasures
Categories
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.