Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)

Vulnerabilities

Attacks

Hardware Vulnerabilities

Bluetooth Vulnerabilities and Attacks

Mobile Vulnerabilities and Attacks

Zero-Day Vulnerabilities

Operating System Vulnerabilities

SQL and XML Injections

Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) Attacks

Buffer Overflows

Race Conditions