UsefulLinks
Computer Science
Cybersecurity
Security Vulnerabilities
1. Fundamentals of Security Vulnerabilities
2. Vulnerability Classification Systems
3. Vulnerability Categories by Location
4. Vulnerability Categories by Impact
5. Web Application Vulnerabilities
6. Software and Memory Vulnerabilities
7. Network and Protocol Vulnerabilities
8. Hardware and Physical Security Vulnerabilities
9. Vulnerability Discovery and Assessment Methodologies
10. Vulnerability Management and Remediation
11. Secure Development and Prevention
12. Emerging and Advanced Vulnerability Landscapes
6.
Software and Memory Vulnerabilities
6.1.
Memory Corruption Vulnerabilities
6.1.1.
Buffer Overflow Attacks
6.1.1.1.
Stack-Based Buffer Overflow
6.1.1.2.
Heap-Based Buffer Overflow
6.1.1.3.
Format String Vulnerabilities
6.1.1.4.
Return-Oriented Programming (ROP)
6.1.1.5.
Jump-Oriented Programming (JOP)
6.1.2.
Integer Vulnerabilities
6.1.2.1.
Integer Overflow
6.1.2.2.
Integer Underflow
6.1.2.3.
Signedness Errors
6.1.2.4.
Truncation Errors
6.1.3.
Pointer-Related Vulnerabilities
6.1.3.1.
Use After Free
6.1.3.2.
Double Free
6.1.3.3.
Dangling Pointers
6.1.3.4.
Null Pointer Dereference
6.1.3.5.
Wild Pointer Access
6.1.4.
Memory Management Errors
6.1.4.1.
Memory Leaks
6.1.4.2.
Uninitialized Memory Access
6.1.4.3.
Out-of-Bounds Access
6.1.4.4.
Stack Exhaustion
6.2.
Concurrency and Race Condition Vulnerabilities
6.2.1.
Time-of-Check to Time-of-Use (TOCTOU)
6.2.2.
Shared Resource Race Conditions
6.2.3.
Deadlock Vulnerabilities
6.2.4.
Thread Safety Issues
6.2.5.
Atomic Operation Failures
6.3.
File System Vulnerabilities
6.3.1.
Insecure File Operations
6.3.1.1.
Unrestricted File Upload
6.3.1.2.
File Type Validation Bypass
6.3.1.3.
File Size Limit Bypass
6.3.1.4.
Malicious File Content
6.3.2.
Path Manipulation
6.3.2.1.
Directory Traversal
6.3.2.2.
Symbolic Link Attacks
6.3.2.3.
Mount Point Confusion
6.3.3.
Temporary File Vulnerabilities
6.3.3.1.
Insecure Temporary File Creation
6.3.3.2.
Temporary File Race Conditions
6.3.3.3.
Predictable Temporary File Names
6.4.
Logic and Business Logic Vulnerabilities
6.4.1.
Workflow Bypasses
6.4.2.
State Machine Vulnerabilities
6.4.3.
Price Manipulation
6.4.4.
Quantity Manipulation
6.4.5.
Time Manipulation
6.4.6.
Multi-Step Process Vulnerabilities
Previous
5. Web Application Vulnerabilities
Go to top
Next
7. Network and Protocol Vulnerabilities