1. Vulnerability
In short, vulnerabilities are the result of three kinds of flaws:
- Implementation errors (e.g., overflows);
- Design flaws (e.g., weak authentication), missing authorization checks;
- Configuration errors or other system or network infrastructure errors.
2. Basic Bug Categories
- Memory corruption errors
Memory corruption errors have been the most prevalent and effective metho