Skip to main content

Introduction

Vulnerabilities#

This is a standardization of the set of vulnerabilities that serve as a basis for the security analysis performed by Fluid Attacks. This is an ever-evolving effort as new types arise every day.

Index#

Abuse Functionality#

Collect Information#

Deceptive Interactions#

Inject Unexpected#

Manipulate Data#

Manipulate System#

Probabilistic Techniques#

Protocol Manipulation#

Subvert Access#