Skip to content
This repository was archived by the owner on Sep 15, 2024. It is now read-only.

Latest commit

 

History

History
23 lines (12 loc) · 754 Bytes

vulnerabilities.md

File metadata and controls

23 lines (12 loc) · 754 Bytes

Vulnerabilities types

What is a vulnerability?

Vulnerability is any weakness within information systems, internal control, or system processes. The vulnerabilities can be exploited to gain access to the system, control over it, process, and infrastructure.

Binary vulnerability is a vulnerability at the binary code level.

Buffer overflow

Allows you to overflow the buffer and therefore to overwrite some valuable pieces of the memory.

Stack overflow

Allows you to overflow the stack and get control over the process.

Format string vulnerability

Allows you to read or overwrite arbitrary data within the executable.

Heap overflow

Allows you to overflow the heap or use a special program behavior to get control over the process.