Also Known As: Unlimited Password Recovery Initiation
Persistent Password Recovery Token
Persistent Password Recovery Token
Variants: Direct
Also Known As: Ineffective Password Recovery Process Termination
Incomplete Session Termination in SSO
Incomplete Session Termination in SSO
Variants: Direct
Persistent Session Lifespan
Persistent Session Lifespan
Variants: Direct
Insufficient Logout Visibility
Insufficient Logout Visibility
Variants: Direct
Insufficient Session Expiration
Insufficient Session Expiration
Variants: Direct
TOCTTOU Transaction Race Condition
Time of Check to Time of Use Transaction Race Condition
Variants: Direct
Also Known As: TOCTTOU
Context Switching Race Condition
Context Switching Race Condition
Variants: Direct
TOCTTOU File Access Race Condition
Time of Check to Time of Use File Access Race Condition
Variants: Direct
Also Known As: TOCTTOU, Race Condition
Member Field Race Condition
Exposure of Data Element to Wrong Session via Data Race Condition
Variants: Direct
Also Known As: Exposure of Data Element to Wrong Session, Singleton Member Field Race Condition, Shared Field Race Condition, Static Field Race Condition
Temporal Session Race Conditions
Temporal Session Race Conditions via Line Targeted ADoS
Variants: Direct
Single Handler Race Condition
Single Handler Race Condition
Variants: Direct
Switch-Case Race Condition
Switch-Case Race Condition
Variants: Direct
Alternate Channel Race Condition
Alternate Channel Race Condition
Variants: Direct
Permission Race Condition During Resource Copy
Permission Race Condition During Resource Copy
Variants: Direct
Link Following Race Condition
Link Following Race Condition
Variants: Direct
Generic Race Condition within a Thread
Generic Race Condition within a Thread
Variants: Direct
Cross-Domain Search Timing
Cross-Domain Search Timing
Variants: Direct
Also Known As: Pixel Perfect Timing Attacks
Username Enumeration in Login
Credentials Enumeration in Login
Variants: Direct
Also Known As: Email Enumeration in Login
Username Enumeration in Password Recovery
Credentials Enumeration in Password Recovery
Variants: Direct
Also Known As: Email Enumeration in Password Recovery
Username Enumeration in Registration
Credentials Enumeration in Registration
Variants: Direct
Also Known As: Email Enumeration in Registration
Generic Username Enumeration
Generic Credential Enumeration
Variants: Direct
Also Known As: Generic Email Enumeration
Password Brute Forcing
Variants: Direct
Also Known As: Weak Password Policy
Weak Password Policy
Weak Password Policy
Variants: Direct
Remote Timing Attack
Remote Timing Attack
Variants: Direct
Also Known As: Cache-timing Attack - Cryptography Variant, Remote side channel attack
Dir and File Brute Forcing
Directory and File Brute Forcing
Variants: Direct
Also Known As: Informative 404 Messages, Web-based Directory Enumeration
Forced Deadlock
Forced Deadlock
Variants: Direct
Also Known As: Unrestricted Externally Accessible Lock
Web Server Thread Occupation
Web Server Thread Pool Occupation
Variants: Direct
Also Known As: Slowloris DoS Attack, RUDY Attack
HTTP Fragmentation Attack
HTTP Fragmentation Attack
Variants: Direct
Also Known As: RUDY Attack, R U Dead Yet Attack
THC-SSL-DoS
THC SSL Denial of Service
Variants: Direct
XML Bomb
XML Bomb
Variants: Direct
Also Known As: Billion Laughs Attack, XML Quadratic Blowup - Variation
ReDOS
Regular Expression DoS
Variants: Direct
Also Known As: RegEx DoS
Database Connection Pool Consumption
Database Connection Pool Consumption
Variants: Direct
Also Known As: Insufficient Resource Pool
Floating Point DoS
Floating Point DoS
Variants: Direct
Also Known As: Magic Number DoS, PHP 2.2250738585072011e-308 Vulnerability, Java Numeric DoS, Mark-of-the-Beast
Hash Collision DoS
Hash Flooding DoS
Variants: Direct
Also Known As: Magic Hash DoS, HashDoS
Resource Exhaustion
Generic Resource Exhaustion
Variants: Direct
Also Known As: XML Ping of Death - Variant
SOAP Coercive Parsing
SOAP Coercive Parsing
Variants: Direct
XML Transformation DOS
XML Signature and Encryption Transformation DOS
Variants: Direct
Also Known As: C14N DOS, XSLT DOS, Xpath DOS
XML Signature - Key Retrieval DOS
XML Signature - Key Retrieval DOS
Variants: Direct
Over-sized XML DoS
Oversized XML DoS
Variants: Direct
Also Known As: XML Document Size Attack
XML Reference Redirect DoS
XML Reference Redirect DoS
Variants: Direct
SOAP Recursive Cryptography DoS
SOAP Recursive Cryptography DoS
Variants: Direct
Referral Flood of Trusted Entities
Referral Flood of Trusted Entities
Variants: Direct
Also Known As: WS-Addressing Spoofing - Variant, Anti-DDoS Service Abuse for Blocking Trusted Entities
HTTP Flood
HTTP Flood
Variants: Direct
Also Known As: HTTP GET Flood, HTTP POST Flood, XML Flood, SSL Flood
Credentials Eavesdropping from Unencrypted Channel
Credentials Transported over Unencrypted Channel
Variants: Direct
Session Hijacking
Session Hijacking via Eavesdropping
Variants: Direct
Also Known As: Session Sidejacking
Unencrypted Communication Eavesdropping
Unencrypted Communication Eavesdropping
Variants: Direct
Also Known As: Insufficient Transport Layer Protection, Lack of Transport Layer Encryption
SSL Stripping
SSL Stripping
Variants: Direct
Session Replay
Session Replay
Variants: Direct
Also Known As: Authentication Bypass by Capture-Replay, Reusing Session ID