<<Taxonomy<< Up to Taxonomy>>Leakage>>

Improper Leakage of Authority or Info

Perimeter Security Confinement
Confused Deputy Communicating Conspirators


Object Identity

Denial of Service

Concurrency Networks Hardware Resources

Each of these are or are not possible or practical depending on the particulars, especially the cooperative patterns the participants are engaged in. The child pages liked to by the table break this into separate cases.