Security Vulnerabilities

  1. Vulnerability Categories by Location
    1. Software Vulnerabilities
      1. Application-Level Vulnerabilities
        1. Web Application Vulnerabilities
          1. Desktop Application Vulnerabilities
            1. Mobile Application Vulnerabilities
              1. API Vulnerabilities
              2. System Software Vulnerabilities
                1. Operating System Vulnerabilities
                  1. Device Driver Vulnerabilities
                    1. Kernel-Level Vulnerabilities
                    2. Third-Party Component Vulnerabilities
                      1. Library Vulnerabilities
                        1. Framework Vulnerabilities
                          1. Plugin and Extension Vulnerabilities
                            1. Supply Chain Vulnerabilities
                          2. Hardware Vulnerabilities
                            1. Processor Vulnerabilities
                              1. CPU Design Flaws
                                1. Microcode Vulnerabilities
                                  1. Cache-Based Attacks
                                  2. Memory Vulnerabilities
                                    1. RAM-Based Attacks
                                      1. Storage Device Vulnerabilities
                                      2. Peripheral Device Vulnerabilities
                                        1. USB Device Vulnerabilities
                                          1. Network Interface Vulnerabilities
                                            1. Input Device Vulnerabilities
                                            2. Firmware Vulnerabilities
                                              1. BIOS/UEFI Vulnerabilities
                                                1. Embedded Firmware Flaws
                                                  1. Update Mechanism Weaknesses
                                                2. Network Infrastructure Vulnerabilities
                                                  1. Protocol-Level Vulnerabilities
                                                    1. TCP/IP Stack Vulnerabilities
                                                      1. Application Protocol Flaws
                                                        1. Wireless Protocol Weaknesses
                                                        2. Network Device Vulnerabilities
                                                          1. Router Vulnerabilities
                                                            1. Switch Vulnerabilities
                                                              1. Firewall Vulnerabilities
                                                                1. Load Balancer Vulnerabilities
                                                              2. Configuration and Deployment Vulnerabilities
                                                                1. Service Configuration Errors
                                                                  1. Permission Misconfigurations
                                                                    1. Default Setting Vulnerabilities
                                                                      1. Deployment Environment Issues
                                                                      2. Process and Organizational Vulnerabilities
                                                                        1. Policy Inadequacies
                                                                          1. Procedure Weaknesses
                                                                            1. Training Deficiencies
                                                                              1. Change Management Failures