Types of computer vulnerability
- en access validation vulnerability (n) ➜
- en bounce attack vulnerability (n) ➜
- en decryption vulnerability (n) ➜
- en denial of service vulnerability (n) ➜
- en eavesdropping vulnerability (n) ➜
- en faulty file replacement vulnerability (n) ➜
- en improper input validation vulnerability (n) ➜
- en insecure login vulnerability (n) ➜
- en insecure mail storage vulnerability (n) ➜
- en javascript command execution vulnerability (n) ➜
- en locally exploitable computer vulnerability (n) ➜
- en mail relay vulnerability (n) ➜
- en no activity logging vulnerability (n) ➜
- en php command execution vulnerability (n) ➜
- en plaintext transmission vulnerability (n) ➜
- en predictable cookie ids vulnerability (n) ➜
- en program configuration vulnerability (n) ➜
- en readable kernel memory vulnerability (n) ➜
- en remotely exploitable computer vulnerability (n) ➜
- en security software bypass vulnerability (n) ➜
- More »
Links to other resources
- sw.opencyc.org /2012/05/10/concept/en/ComputerVulnerability