Browser Security and Exploitation

  1. Vulnerability Classifications
    1. Cross-Site Scripting
      1. Reflected XSS
        1. Input Reflection Mechanisms
          1. URL Parameter Injection
            1. HTTP Header Injection
            2. Stored XSS
              1. Persistent Storage Locations
                1. Database Injection
                  1. File System Storage
                  2. DOM-Based XSS
                    1. Client-Side Injection Points
                      1. JavaScript Sink Analysis
                        1. Source-to-Sink Flow
                        2. Universal XSS
                          1. Browser Implementation Bugs
                            1. Extension Vulnerabilities
                              1. Same-Origin Policy Bypass
                              2. XSS Prevention Methods
                                1. Input Validation
                                  1. Output Encoding
                                    1. Content Security Policy
                                      1. HttpOnly Cookies
                                    2. Cross-Site Request Forgery
                                      1. CSRF Attack Vectors
                                        1. GET Request Exploitation
                                          1. POST Request Exploitation
                                            1. JSON Request Exploitation
                                            2. CSRF Protection Mechanisms
                                              1. Synchronizer Tokens
                                                1. Double Submit Cookies
                                                  1. Custom Header Verification
                                                2. Memory Corruption Vulnerabilities
                                                  1. Buffer Overflow Types
                                                    1. Stack Buffer Overflow
                                                      1. Heap Buffer Overflow
                                                        1. Integer Overflow Leading to Buffer Overflow
                                                        2. Use-After-Free Vulnerabilities
                                                          1. Object Lifetime Management
                                                            1. Dangling Pointer Exploitation
                                                              1. Heap Spray Techniques
                                                              2. Type Confusion Attacks
                                                                1. Object Type Verification Bypass
                                                                  1. Virtual Function Table Corruption
                                                                    1. Dynamic Type System Abuse
                                                                    2. Out-of-Bounds Access
                                                                      1. Array Index Validation Bypass
                                                                        1. Bounds Check Elimination
                                                                          1. Speculative Execution Exploitation
                                                                          2. Double Fetch Vulnerabilities
                                                                            1. Time-of-Check Time-of-Use
                                                                              1. Race Condition Exploitation
                                                                                1. Kernel-User Space Communication
                                                                              2. Logic Vulnerabilities
                                                                                1. Authentication Bypass
                                                                                  1. Session Management Flaws
                                                                                    1. Authorization Logic Errors
                                                                                    2. Business Logic Flaws
                                                                                      1. Workflow Manipulation
                                                                                        1. State Machine Violations
                                                                                        2. IPC Logic Vulnerabilities
                                                                                          1. Message Validation Bypass
                                                                                            1. Privilege Escalation via IPC
                                                                                              1. Process Communication Abuse
                                                                                            2. Side-Channel Attacks
                                                                                              1. Timing Attacks
                                                                                                1. Cache Timing Analysis
                                                                                                  1. Network Timing Analysis
                                                                                                    1. Cryptographic Timing Attacks
                                                                                                    2. Speculative Execution Attacks
                                                                                                      1. Spectre Variants
                                                                                                        1. Meltdown Attack
                                                                                                          1. Microarchitectural Data Sampling
                                                                                                          2. Cross-Site Information Leaks
                                                                                                            1. Cross-Origin State Inference
                                                                                                              1. Resource Timing Attacks
                                                                                                                1. Error Message Analysis