Vulnerabilities
A vulnerability is a weakness or flaw in the design, or implementation of a system or application that could be exploited by an attacker to compromise its security.

Vulnerabilities can arise from a variety of sources, such as poor coding practices, outdated software, misconfigurations, lack of encryption, or weak access controls. When left unaddressed, these weaknesses can allow attackers to gain unauthorized access, execute malicious code, escalate privileges, steal sensitive data, or disrupt services.
Types of Vulnerabilities
Vulnerabilities are often categorized based on their nature and the type of threat they pose. Here are some common types of vulnerabilities:
Segmentation Flaw: Vulnerability due to connecting different functions of a network all in one, letting access to all network devices from other unrelated paths
Repudiation: When an application or system does not adopt controls to properly track and log users' actions
IDOR: Insecure Direct Object References, when an application uses user-supplied input to access objects directly. Affects the system because the web application does not validate whether the user has permission to access the requested object
Buffer Overflow: Data is written or changed beyond the limits of a buffer (memory for an application) provoking the application to access memory allocated to other processes or crash
Non-Validated Input: Data that the application isn't capable of processing is inserted which could cause crashing or malfunction
Race conditions: The output of an event depends on ordered or timed outputs and it doesn't occur in the correct order or at the proper time
Version disclosure: Show the version of the components used on a web page or application
Vulnerability vs Threat vs Risk
The relationship between vulnerabilities, threats, and risks is essential for assessing and mitigating security issues effectively. This relation exposes that by reducing vulnerabilities and implementing security controls, organizations can lower their risk exposure to a threat as follows:
Last updated