5 Cyber Security Vulnerability
5 Cyber Security Vulnerability
1. Injec on vulnerabili es
2. Buffer Overflows
3. Sensi ve Data Exposure
4. Broken Authen ca on & Session Management
5. Security Misconfigura on
Buffer Overflows:
A buffer overflow attack is a common cyberattack that deliberately exploits a buffer
overflow vulnerability where user-controlled data is written to memory.
Buffer overflow vulnerabilities typically occur in code that: Relies on external data to
control its behavior.
User loses control over his data.
Security fault