You are on page 1of 3

FIVE CYBER SECURITY VULNERABILITY: -

1. Injec on vulnerabili es
2. Buffer Overflows
3. Sensi ve Data Exposure
4. Broken Authen ca on & Session Management
5. Security Misconfigura on

 Injec on Vulnerabili es:


 An injection flaw is a vulnerability which allows an attacker to relay malicious code
through an application to another system.
 example is SQL injection, where an attacker sends “101 OR 1=1” for cracking the
credentials of the victim.

 Buffer Overflows:
 A buffer overflow attack is a common cyberattack that deliberately exploits a buffer
overflow vulnerability where user-controlled data is written to memory.
 Buffer overflow vulnerabilities typically occur in code that: Relies on external data to
control its behavior.
 User loses control over his data.

Memory Out of bound error


 Sensi ve data exposure:
 Sensitive data can include anything from personally identifiable information (PII),
such as Social Security numbers, to banking information, to login credentials.
 When this data is accessed by an attacker as a result of a data breach, users are at
risk for sensitive data exposure.

Stelling of sensi ve data leads to black mailing


 Broken Authen ca on & Session Management:
 broken authentication and session management allows a cybercriminal to steal a
user's login data, or forge session data, such as cookies, to gain access to websites.
 when attackers are able to compromise passwords, keys or session tokens, user
account information, and other details to assume user identities.
 Broken authentication act as open gate for the attackers.
 Security Misconfigura on:
 A security misconfiguration arises when essential security settings are either not
implemented or implemented with errors.
 Security tool misconfigurations could occur if a user does not install the latest
signature files of an anti-malware tool,

Security fault

You might also like