UsefulLinks
Computer Science
Cybersecurity
Security Vulnerabilities
1. Fundamentals of Security Vulnerabilities
2. Vulnerability Classification Systems
3. Vulnerability Categories by Location
4. Vulnerability Categories by Impact
5. Web Application Vulnerabilities
6. Software and Memory Vulnerabilities
7. Network and Protocol Vulnerabilities
8. Hardware and Physical Security Vulnerabilities
9. Vulnerability Discovery and Assessment Methodologies
10. Vulnerability Management and Remediation
11. Secure Development and Prevention
12. Emerging and Advanced Vulnerability Landscapes
4.
Vulnerability Categories by Impact
4.1.
Code Execution Vulnerabilities
4.1.1.
Remote Code Execution (RCE)
4.1.2.
Local Code Execution
4.1.3.
Arbitrary Code Execution
4.1.4.
Command Injection
4.1.5.
Script Injection
4.2.
Privilege Escalation Vulnerabilities
4.2.1.
Vertical Privilege Escalation
4.2.2.
Horizontal Privilege Escalation
4.2.3.
Authentication Bypass
4.2.4.
Authorization Bypass
4.3.
Information Disclosure Vulnerabilities
4.3.1.
Data Leakage
4.3.2.
Information Exposure
4.3.3.
Directory Traversal
4.3.4.
Source Code Disclosure
4.3.5.
Configuration Information Disclosure
4.4.
Denial of Service Vulnerabilities
4.4.1.
Resource Exhaustion
4.4.2.
Application Crashes
4.4.3.
System Hangs
4.4.4.
Network Flooding
4.4.5.
Amplification Attacks
4.5.
Data Integrity Vulnerabilities
4.5.1.
Unauthorized Data Modification
4.5.2.
Data Corruption
4.5.3.
Transaction Manipulation
4.5.4.
State Manipulation
Previous
3. Vulnerability Categories by Location
Go to top
Next
5. Web Application Vulnerabilities