Useful Links
Computer Science
Cybersecurity
Security Vulnerabilities
1. Fundamentals of Security Vulnerabilities
2. Vulnerability Classification Systems
3. Vulnerability Categories by Location
4. Vulnerability Categories by Impact
5. Web Application Vulnerabilities
6. Software and Memory Vulnerabilities
7. Network and Protocol Vulnerabilities
8. Hardware and Physical Security Vulnerabilities
9. Vulnerability Discovery and Assessment Methodologies
10. Vulnerability Management and Remediation
11. Secure Development and Prevention
12. Emerging and Advanced Vulnerability Landscapes
Software and Memory Vulnerabilities
Memory Corruption Vulnerabilities
Buffer Overflow Attacks
Stack-Based Buffer Overflow
Heap-Based Buffer Overflow
Format String Vulnerabilities
Return-Oriented Programming (ROP)
Jump-Oriented Programming (JOP)
Integer Vulnerabilities
Integer Overflow
Integer Underflow
Signedness Errors
Truncation Errors
Pointer-Related Vulnerabilities
Use After Free
Double Free
Dangling Pointers
Null Pointer Dereference
Wild Pointer Access
Memory Management Errors
Memory Leaks
Uninitialized Memory Access
Out-of-Bounds Access
Stack Exhaustion
Concurrency and Race Condition Vulnerabilities
Time-of-Check to Time-of-Use (TOCTOU)
Shared Resource Race Conditions
Deadlock Vulnerabilities
Thread Safety Issues
Atomic Operation Failures
File System Vulnerabilities
Insecure File Operations
Unrestricted File Upload
File Type Validation Bypass
File Size Limit Bypass
Malicious File Content
Path Manipulation
Directory Traversal
Symbolic Link Attacks
Mount Point Confusion
Temporary File Vulnerabilities
Insecure Temporary File Creation
Temporary File Race Conditions
Predictable Temporary File Names
Logic and Business Logic Vulnerabilities
Workflow Bypasses
State Machine Vulnerabilities
Price Manipulation
Quantity Manipulation
Time Manipulation
Multi-Step Process Vulnerabilities
Previous
5. Web Application Vulnerabilities
Go to top
Next
7. Network and Protocol Vulnerabilities