Useful Links
Computer Science
Cybersecurity
Security Vulnerabilities
1. Fundamentals of Security Vulnerabilities
2. Vulnerability Classification Systems
3. Vulnerability Categories by Location
4. Vulnerability Categories by Impact
5. Web Application Vulnerabilities
6. Software and Memory Vulnerabilities
7. Network and Protocol Vulnerabilities
8. Hardware and Physical Security Vulnerabilities
9. Vulnerability Discovery and Assessment Methodologies
10. Vulnerability Management and Remediation
11. Secure Development and Prevention
12. Emerging and Advanced Vulnerability Landscapes
Vulnerability Categories by Impact
Code Execution Vulnerabilities
Remote Code Execution (RCE)
Local Code Execution
Arbitrary Code Execution
Command Injection
Script Injection
Privilege Escalation Vulnerabilities
Vertical Privilege Escalation
Horizontal Privilege Escalation
Authentication Bypass
Authorization Bypass
Information Disclosure Vulnerabilities
Data Leakage
Information Exposure
Directory Traversal
Source Code Disclosure
Configuration Information Disclosure
Denial of Service Vulnerabilities
Resource Exhaustion
Application Crashes
System Hangs
Network Flooding
Amplification Attacks
Data Integrity Vulnerabilities
Unauthorized Data Modification
Data Corruption
Transaction Manipulation
State Manipulation
Previous
3. Vulnerability Categories by Location
Go to top
Next
5. Web Application Vulnerabilities