Category:Attack Categorisation By Attack Spreading
Jump to navigation
Jump to search
We distinguish between attacks that are possible because of:
- application specific flaws - implementation weaknesses in the web service frameworks used
- conceptual flaws - flaws in the underlying standard.
Subcategories
This category has the following 2 subcategories, out of 2 total.
Pages in category "Attack Categorisation By Attack Spreading"
The following 36 pages are in this category, out of 36 total.
X
- XML Document Size Attack
- XML Encryption - Transformation DOS
- XML Entity Expansion
- XML Entity Reference Attack
- XML External Entity DOS
- XML Flooding
- XML Injection
- XML Signature - Key Retrieval DOS
- XML Signature - Key Retrieval XSA (Cross Site Attack)
- XML Signature Exclusion
- XML Signature Wrapping
- XML Signature Wrapping - Optional Element
- XML Signature Wrapping - Optional Element in Security Header
- XML Signature Wrapping - Simple Context
- XML Signature Wrapping - with Namespace Injection
- XML Signature – Transformation DOS
- XML Signature – XSLT Code Execution
- Xpath Injection