Types of computer vulnerability
- en access validation vulnerability (n) ➜
 - en bounce attack vulnerability (n) ➜
 - en decryption vulnerability (n) ➜
 - en denial of service vulnerability (n) ➜
 - en eavesdropping vulnerability (n) ➜
 - en faulty file replacement vulnerability (n) ➜
 - en improper input validation vulnerability (n) ➜
 - en insecure login vulnerability (n) ➜
 - en insecure mail storage vulnerability (n) ➜
 - en javascript command execution vulnerability (n) ➜
 - en locally exploitable computer vulnerability (n) ➜
 - en mail relay vulnerability (n) ➜
 - en no activity logging vulnerability (n) ➜
 - en php command execution vulnerability (n) ➜
 - en plaintext transmission vulnerability (n) ➜
 - en predictable cookie ids vulnerability (n) ➜
 - en program configuration vulnerability (n) ➜
 - en readable kernel memory vulnerability (n) ➜
 - en remotely exploitable computer vulnerability (n) ➜
 - en security software bypass vulnerability (n) ➜
 - More »
 
Links to other resources
- sw.opencyc.org /2012/05/10/concept/en/ComputerVulnerability