Full Disclosure mailing list archives

Re: What are the basic vulnerabilities of a software?


From: T Biehn <tbiehn () gmail com>
Date: Mon, 31 May 2010 12:27:40 -0400

Misuse, mis-implementation of cryptographic primitives.

Errors in state based code, skipping authentication states and moving to
authenticated states, for instance.

For everything else see whatever publication.

Why did I answer this :(

-Travis

On Mon, May 31, 2010 at 8:56 AM, Christian Sciberras <uuf6429 () gmail com>wrote:

0. Human error.







On Mon, May 31, 2010 at 11:50 AM, rajendra prasad <
rajendra.palnaty () gmail com> wrote:

Hi List,
I am preparing a list of main and basic vulnerabilities in software.
Please let me know If you know other than the below list.
List of Basic Vulnerabilities:
1. Buffer Overflow: Stack, Heap.
2. Format String Vulnerabilities
3. SQL Injections
4. XSS Vulnerabilities

Thanks
Rajendra Prasad.Palnaty

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




-- 
FD1D E574 6CAB 2FAF 2921  F22E B8B7 9D0D 99FF A73C
http://pgp.mit.edu:11371/pks/lookup?search=tbiehn&op=index&fingerprint=on
http://pastebin.com/f6fd606da
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: