Skip to main content

Introduction

Vulnerabilities

This is a standardization of the set of vulnerabilities that serve as a basis for the security analysis performed by Fluid Attacks. This is an ever-evolving effort as new types arise every day.

Index

Access Subversion

Data Manipulation

Deceptive Interactions

Functionality Abuse

Information Collection

Probabilistic Techniques

Protocol Manipulation

System Manipulation

Unexpected Injection