Skip to main content

Introduction

Vulnerabilities

This is a standardization of the set of vulnerabilities that serve as a basis for the security analysis performed by Fluid Attacks. This is an ever-evolving effort as new types arise every day.

Index

Abuse Functionality

Collect Information

Deceptive Interactions

Inject Unexpected

Manipulate Data

Manipulate System

Probabilistic Techniques

Protocol Manipulation

Subvert Access