Types Of Vulnerabilities Flashcards
Jailbreaking
Mobile vulnerability, is the bypassing the security restrictions on mobile device in order to gain greater control and access to the device operating system and files
Side channel
Weakness in hardware, weakness in physical properties of a device such as power consumption or electromagnetic radiation that can be used to extract sensitive information
Memory leak
Memory vulnerability, is the failure of OS ar app to free up dynamically requested memory. It slowest response time or can cause denial of service
Buffer overflow
Memory and processor vulnerability, is overrunning the memory allocated (buffer) for data input and writing the excess data into non-allocated system memory. The excess data can contain instructions that the processor will execute
TOE - time of evaluation
Race condition timing component - is when the program relies on the time of events concurrently or in a specific order
Race condition
Timing vulnerability, this is a flow that produces an unexpected result when timing of actions impact other actions
TOC time of check
Race condition component, is when a program checks when the state of resource changes between time of check and time of use often because of a concurrent thread.
Escalation
System vulnerability which can cause access to protected area
Memory injection
System vulnerability which can execute control. Memory injection is inserting malicious code into memory of a running process. The excess data can contain informations, instructions for execution in the processor.
Privileged escalation
Injection type, code vulnerability, is gaining elevated access to resources that are normally protected from an application or user
Insecure APi
Cloud vulnerability, API used to provide an access to and integrate cloud resources such as storage and processing. IT provide a conduit for malicious activity
Directory traversal
Code vulnerability, injection type when there is the ability to access files and directories outside of the intended directory
Side loading
Mobile vulnerability, is the process of installing and running software on a mobile device from source other than an official apps store or marketplace
Injection
Code vulnerability, is the insertion of code by exploiting input validation or processing mechanisms