Availability & Abuse
Availability & Abuse vulnerabilities at a glance
Overview
Aattackers can degrade service performance or completely deny access to legitimate users by overloading systems.
There are different approaches for how these attacks can take place, but they are all focused on exceeding the capacity for a system. These attacks are particularly concerning because they can often be executed with minimal resources while causing significant impact. A single attacker can take down services costing thousands in lost revenue and reputation damage.
Where it occurs
Availability attacks can occur within different points of a system, depending on what type of resource is being exploited.
Impact
Availability attacks lead to service downtime affecting all users, financial losses from lost transactions and SLA violations, reputation damage from poor reliability, and more.
Prevention
The specific approach for prevention will depend on the exact type of vulnerability, but in general you will want to have sufficient restrictions, limits, and controls over any resource.
Specific Vulnerabilities
Explore specific vulnerability types within this category:
Detect These Vulnerabilities in Your Code
Sourcery automatically identifies availability & abuse and related vulnerabilities in your codebase.
Scan Your Code for Free