Vulnerability Knowledge Base
From Frequently Asked Questions
When you look at earlier advisories from the 1980s and 1990s in this archive, you can easily be amused at what caused organizations to release information. There was a time when sendmail vulnerabilities made up the bulk of concerns for a given year. The government would alert you that a new mystery virus would delete data on drives A: and B:. Warnings came out for this thing called "spam". For those of us that have been around for a while, we can sometimes long for those days of simplicity. But, as time progresses, the world gets more complicated. Dependencies on third party software seems like a requirement for anything to function. There are toasters connected to the internet. If your work requires you to take an interest in security, the amount of flaws being constantly disclosed can feel like a firehose to the face as you drink your morning coffee. Again, toasters are connected to the internet.


This section was created to provide you help. The archive, as a whole, provides you timely information on public research, but that research does not always provide details about the types of vulnerabilities you will see listed. The below links are meant to help provide guidance on how types of vulnerabilities are exploited and how they can be remediated. Note: This data will always be a work in progress and may not always be perfect. We make no claims that these are the only remediation methodologies nor all the manners in which these issues can be exploited, but rather it is to provide assistance with understanding as a whole.


We are always looking to improve on the datasets below. If you find an issue with anything such as incorrect or dated material, or want to contribute, please contact us as we welcome your help.


Arbitrary File Upload / Shell Upload ()
Address Space Layout Randomization Bypass ()
Backdoors ()
Bypasses ()
Code / Command Execution ()
CORS Settings ()
Clickjacking ()
Code Injection ()
Command Injection ()
Cookie Poisoning ()
CPU Vulnerabilities ()
Cross Domain Policy ()
Cross Site Request Forgery ()
Cross Site Scripting (Reflective / Persistent) ()
Cryptographic Bit Flipping ()
Cryptography Poorly Implemented ()
Insecure TLS Usage ()
CSS Injection ()
Debugging Enabled ()
Denial of Service / Resource Exhaustion ()
Deserialization Attacks ()
Directory Traversal ()
DLL Hijacking ()
DNS Cache Poisoning ()
Exposed Attack Surface ()
File Inclusion (Local / Remote) ()
Firmware Issues ()
Format String ()
HTML Injection ()
HTTP Parameter Pollution ()
HTTP Request Smuggling ()
HTTP Response Splitting ()
Information Disclosure ()
Insecure Cookie Settings ()
Insecure Direct Object Reference ()
Insecure Storage ()
Insecure Transit ()
LDAP Injection ()
Memory Handling Issues (Overflows, Off-By-One, NULL Pointers, etc) ()
Missing / Broken Authentication ()
Missing / Broken Authorization ()
NULL Byte Attacks ()
Open Mail Relay ()
Open Redirection ()
Privilege Escalation / Elevation of Privilege ()
Race Condition ()
Server-Side Request Forgery ()
Session Fixation ()
Session Replay ()
Side Channel Attacks ()
Sliding Windows ()
SMTP Header Injection ()
Social Engineering ()
SQL Injection ()
SSI Injection ()
Template Injection ()
Weak Permissions ()
XML eXternal Entity Injection ()
XPATH Injection ()


Help Section



 About | Terms | Copyright | Privacy | BlueSky | X | Mastodon
 © 2024 - 2025
All Rights Reserved Packet Storm Security, LLC
Hosting provided by: RokaSecurity