Fuzzing

  1. Common Vulnerabilities Discovered by Fuzzing
    1. Memory Corruption Bugs
      1. Buffer Overflows
        1. Stack Buffer Overflows
          1. Heap Buffer Overflows
          2. Use-After-Free
            1. Dangling Pointer Dereference
              1. Temporal Memory Safety
              2. Double Free
                1. Multiple Deallocation
                  1. Heap Corruption
                  2. Integer Overflows
                    1. Signed Overflows
                      1. Unsigned Overflows
                        1. Arithmetic Errors
                        2. Format String Vulnerabilities
                          1. Uncontrolled Format Strings
                            1. Information Disclosure
                          2. Denial of Service
                            1. Unhandled Exceptions
                              1. Program Crashes
                                1. Resource Exhaustion
                                2. Infinite Loops
                                  1. CPU Exhaustion
                                    1. Algorithmic Complexity
                                    2. Memory Exhaustion
                                      1. Heap Exhaustion
                                        1. Stack Overflow
                                      2. Information Leaks
                                        1. Unintended Data Disclosure
                                          1. Memory Disclosure
                                            1. Timing Side Channels
                                            2. Injection Vulnerabilities
                                              1. Command Injection
                                                1. Shell Command Execution
                                                  1. System Call Injection
                                                  2. SQL Injection
                                                    1. Database Query Manipulation
                                                    2. Code Injection
                                                      1. Script Injection
                                                        1. Dynamic Code Execution
                                                      2. Deserialization Vulnerabilities
                                                        1. Unsafe Object Deserialization
                                                          1. Remote Code Execution Risks
                                                            1. Data Integrity Issues
                                                            2. Logic Bugs
                                                              1. Authentication Bypass
                                                                1. Authorization Flaws
                                                                  1. Business Logic Errors