Security Vulnerabilities
Remote Code Execution (RCE)
Local Code Execution
Arbitrary Code Execution
Command Injection
Script Injection
Vertical Privilege Escalation
Horizontal Privilege Escalation
Authentication Bypass
Authorization Bypass
Data Leakage
Information Exposure
Directory Traversal
Source Code Disclosure
Configuration Information Disclosure
Resource Exhaustion
Application Crashes
System Hangs
Network Flooding
Amplification Attacks
Unauthorized Data Modification
Data Corruption
Transaction Manipulation
State Manipulation
Previous
3. Vulnerability Categories by Location
Go to top
Next
5. Web Application Vulnerabilities