|
Full Disclosure
mailing list archives
Re: What are the basic vulnerabilities of a software?
From: T Biehn <tbiehn () gmail com>
Date: Mon, 31 May 2010 12:27:40 -0400
Misuse, mis-implementation of cryptographic primitives.
Errors in state based code, skipping authentication states and moving to
authenticated states, for instance.
For everything else see whatever publication.
Why did I answer this :(
-Travis
On Mon, May 31, 2010 at 8:56 AM, Christian Sciberras <uuf6429 () gmail com>wrote:
0. Human error.
On Mon, May 31, 2010 at 11:50 AM, rajendra prasad <
rajendra.palnaty () gmail com> wrote:
Hi List,
I am preparing a list of main and basic vulnerabilities in software.
Please let me know If you know other than the below list.
List of Basic Vulnerabilities:
1. Buffer Overflow: Stack, Heap.
2. Format String Vulnerabilities
3. SQL Injections
4. XSS Vulnerabilities
Thanks
Rajendra Prasad.Palnaty
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
--
FD1D E574 6CAB 2FAF 2921 F22E B8B7 9D0D 99FF A73C
http://pgp.mit.edu:11371/pks/lookup?search=tbiehn&op=index&fingerprint=on
http://pastebin.com/f6fd606da
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
|