Vulnerabilities

Vulnerability is a weakness in software, hardware, or procedures that can be exploited by an attacker to gain unauthorized access, disrupt services, or steal data. These flaws can exist in operating systems, applications, protocols, and even user behavior.

To help standardize the way we talk about and address these weaknesses, the Common Weakness Enumeration (CWE) was created. CWE is a publicly available list that categorizes common software and hardware weaknesses. Each CWE entry includes a unique identifier, a detailed description, and examples of how the weakness might be exploited.

By using CWE, developers, security professionals, and tool vendors can better communicate about vulnerabilities, assess risk, and implement targeted mitigation strategies. It also forms the foundation for vulnerability scoring systems like CVSS and standards like OWASP Top 10.

Common types of vulnerabilities include:

  • XSS Cross-Site Scripting (XSS): XSS allows attackers to inject malicious scripts into web pages viewed by others, potentially stealing cookies, sessions, or redirecting users.
  • SQLi SQL Injection (SQLi): SQLi occurs when an attacker can manipulate SQL queries through user input, allowing unauthorized access or modification of database contents.
  • BruteForce Improper Authentication (Brute Force): Occurs when systems fail to properly verify user identity, enabling attackers to gain access via credential brute forcing.
  • CSRF Cross-Site Request Forgery (CSRF): CSRF tricks a logged-in user into submitting unintended requests, potentially altering user data or performing unauthorized actions.
  • XXE XML External Entity (XXE) Injection: XXE attacks exploit XML parsers to access internal files or perform SSRF through crafted XML inputs.
  • PathTraversal Path Traversal: Path traversal enables attackers to access files outside the intended directory by manipulating file paths.
  • SSRF Server-Side Request Forgery (SSRF): SSRF allows attackers to make the server send requests to internal or external systems, potentially exposing sensitive services.
  • DoS Uncontrolled Resource Consumption (DoS): DoS vulnerabilities allow attackers to exhaust system resources, making services unavailable to legitimate users.
  • Phishing Phishing: Phishing involves tricking users into revealing sensitive information, such as passwords or credit card numbers, often through deceptive emails or websites.
  • ManInTheMiddle Man In The Middle (MITM): MITM attacks intercept and alter communications between two parties without their knowledge, allowing attackers to eavesdrop or manipulate data.
  • Exploit Exploit: Exploits take advantage of vulnerabilities in software or systems to gain unauthorized access or perform malicious actions.