Cybersecurity Ontology Shield Cybersecurity Ontology

Category: Vulnerability

Browsing 31 concepts

Found 31 matches
Vulnerability

Restrictions on what authenticated users are allowed to do are not properly enforced.

Vulnerability

Failures permitting attackers to compromise passwords, keys, or session tokens.

Vulnerability

Code and infrastructure that does not protect against unauthorized modification.

Vulnerability

Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens.

Vulnerability

Complex access control policies with different hierarchies, groups, and roles.

Backdoor preferred
Vulnerability

A method of bypassing normal authentication.

Vulnerability

Weaknesses in authentication mechanisms allowing attackers to compromise passwords or keys.

Vulnerability

A condition where a program attempts to write data beyond the end of a fixed-length buffer.

Clickjacking preferred
Vulnerability

A malicious technique of tricking a user into clicking on something different from what the user perceives, effectively revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.

Vulnerability

An attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application.

Vulnerability

Improper neutralization of input during web page generation ('Cross-site Scripting').

Vulnerability

Insecure deserialization of untrusted data leading to remote code execution.

Vulnerability

An exploit where a malicious actor can access restricted directories and execute commands outside of the web server's root directory.

FormBook preferred
Vulnerability

An information stealer that harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes.

IcedID preferred
Vulnerability

A banking trojan capable of stealing credentials for a variety of services.

Incident preferred
Vulnerability

An event that could lead to loss of, or disruption to, an organization's operations, services or functions.

Vulnerability

A type of access control vulnerability that arises when an application provides direct access to objects based on user-supplied input.

Vulnerability

Lack of adequate logging and monitoring allows attackers to maintain persistence.

Vulnerability

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

Mimikatz preferred
Vulnerability

An open-source credential dumper.

Vulnerability

A failure to verify function level access rights before making that functionality visible in the UI or processed on the server.

Vulnerability

The act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

Vulnerability

A vulnerability that allows an attacker to execute arbitrary code on a remote device.

Vulnerability

Insecure default settings, incomplete or ad hoc configurations, and open cloud storage.

Vulnerability

Failure to properly protect sensitive data such as financial, healthcare, or PII.

Vulnerability

A web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location.

SQL Injection preferred
Vulnerability

Improper neutralization of special elements used in an SQL command ('SQL Injection').

TrickBot preferred
Vulnerability

A banking Trojan designed to steal financial details, account credentials, and personally identifiable information.

Vulnerability

Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover.

Vulnerability

Use of older or known vulnerable encryption algorithms.

Vulnerability

A hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it.