李文军“一家”的爱心小院

What is a vulnerability?

百度 据此前消息,华为P20Pro将主打徕卡三摄以及麒麟970AI人工智能,摄像头规格为4000万+800万+2000万像素摄像头,F/光圈,拥有4000mAh大电池。

A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application. Stakeholders include the application owner, application users, and other entities that rely on the application.

Please do not post any actual vulnerabilities in products, services, or web applications. Those disclosure reports should be posted to bugtraq or full-disclosure mailing lists.

Examples of vulnerabilities

  • Lack of input validation on user input
  • Lack of sufficient logging mechanism
  • Fail-open error handling
  • Not closing the database connection properly

For a great overview, check out the OWASP Top Ten Project. You can read about the top vulnerabilities and download a paper that covers them in detail. Many organizations and agencies use the Top Ten as a way of creating awareness about application security.

NOTE: Before you add a vulnerability, please search and make sure there isn’t an equivalent one already. You may want to consider creating a redirect if the topic is the same. Every vulnerability article has a defined structure.

List of Vulnerabilities