Security Vulnerabilities

  1. Software and Memory Vulnerabilities
    1. Memory Corruption Vulnerabilities
      1. Buffer Overflow Attacks
        1. Stack-Based Buffer Overflow
          1. Heap-Based Buffer Overflow
            1. Format String Vulnerabilities
              1. Return-Oriented Programming (ROP)
                1. Jump-Oriented Programming (JOP)
                2. Integer Vulnerabilities
                  1. Integer Overflow
                    1. Integer Underflow
                      1. Signedness Errors
                        1. Truncation Errors
                        2. Memory Management Errors
                          1. Memory Leaks
                            1. Uninitialized Memory Access
                              1. Out-of-Bounds Access
                                1. Stack Exhaustion
                              2. Concurrency and Race Condition Vulnerabilities
                                1. Time-of-Check to Time-of-Use (TOCTOU)
                                  1. Shared Resource Race Conditions
                                    1. Deadlock Vulnerabilities
                                      1. Thread Safety Issues
                                        1. Atomic Operation Failures
                                        2. File System Vulnerabilities
                                          1. Insecure File Operations
                                            1. Unrestricted File Upload
                                              1. File Type Validation Bypass
                                                1. File Size Limit Bypass
                                                  1. Malicious File Content
                                                  2. Path Manipulation
                                                    1. Directory Traversal
                                                      1. Mount Point Confusion
                                                      2. Temporary File Vulnerabilities
                                                        1. Insecure Temporary File Creation
                                                          1. Temporary File Race Conditions
                                                            1. Predictable Temporary File Names
                                                          2. Logic and Business Logic Vulnerabilities
                                                            1. Workflow Bypasses
                                                              1. State Machine Vulnerabilities
                                                                1. Price Manipulation
                                                                  1. Quantity Manipulation
                                                                    1. Time Manipulation
                                                                      1. Multi-Step Process Vulnerabilities