Security Glossary

A reference guide to the terminology, techniques, and frameworks that define modern offensive security. Whether you're evaluating pentesting vendors, building a security program, or researching autonomous AI testing, this glossary covers the concepts that security professionals encounter daily — from foundational vulnerability classes like SQL injection and XSS to emerging categories like agentic AI and multi-agent systems. Each entry includes practical context on why the term matters, how it relates to real-world security operations, and how Revaizor's autonomous platform approaches it.

28 terms

Vulnerability Types

Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery is an attack that forces authenticated users to execute unintended actions on a web application by exploiting the browser's automatic inclusion of credentials in requests.

intermediate

Cross-Site Scripting (XSS)

Cross-Site Scripting is a client-side code injection vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, enabling session hijacking and data theft.

beginner

Insecure Deserialization

Insecure Deserialization is a vulnerability that occurs when an application deserializes untrusted data without proper validation, potentially allowing attackers to execute arbitrary code or manipulate application logic.

advanced

Insecure Direct Object References (IDOR)

Insecure Direct Object References occur when an application exposes internal object identifiers in URLs or parameters without proper authorization checks, allowing attackers to access other users' data.

beginner

Path Traversal

Path Traversal is a vulnerability that allows attackers to access files and directories outside the intended directory by manipulating file path references with sequences like ../ in application input.

intermediate

Remote Code Execution (RCE)

Remote Code Execution is a critical vulnerability class that allows an attacker to execute arbitrary code on a target system remotely, often leading to complete system compromise and lateral movement.

advanced

Server-Side Request Forgery (SSRF)

Server-Side Request Forgery is a vulnerability that allows an attacker to induce a server-side application to make HTTP requests to an arbitrary domain or internal resource of the attacker's choosing.

intermediate

SQL Injection

SQL Injection is a code injection technique that exploits vulnerabilities in an application's database layer by inserting malicious SQL statements into input fields or query parameters.

beginner

Attack Techniques

Security Tools

Compliance Frameworks

AI Concepts

Pentesting Methodology

Ready to try autonomous pentesting?

See how Revaizor can transform your security testing.

Request Early Access