Online copy of the book “Computer Vulnerabilities” covers a complete description of how vulnerabilities can be catagoried, adding great detail to previous works on vulnerability taxonomies. This book is a draft, but because of the dynamic nature of network publications, can be revised at any time.
You can download it from the following link: https://packetstormsecurity.com/files/download/10118/compvuln_draft.pdf
Source: https://packetstormsecurity.com/files/10118/compvuln_draft.pdf.html

