4 lines
334 B
Plaintext
4 lines
334 B
Plaintext
By repeatedly requesting a feature that consumes a lot of memory, attackers can constantly occupy
|
|
an important part of an application's hosting server memory. Depending on the application's deployment architecture, hosting server
|
|
resources and attackers' capabilities, this can lead to an exhaustion of the available server's memory.
|