[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] What are the basic vulnerabilities of a software?



Misuse, mis-implementation of cryptographic primitives.

Errors in state based code, skipping authentication states and moving to
authenticated states, for instance.

For everything else see whatever publication.

Why did I answer this :(

-Travis

On Mon, May 31, 2010 at 8:56 AM, Christian Sciberras <uuf6429@xxxxxxxxx>wrote:

> 0. Human error.
>
>
>
>
>
>
>
> On Mon, May 31, 2010 at 11:50 AM, rajendra prasad <
> rajendra.palnaty@xxxxxxxxx> wrote:
>
>> Hi List,
>> I am preparing a list of main and basic vulnerabilities in software.
>> Please let me know If you know other than the below list.
>> List of Basic Vulnerabilities:
>> 1. Buffer Overflow: Stack, Heap.
>> 2. Format String Vulnerabilities
>> 3. SQL Injections
>> 4. XSS Vulnerabilities
>>
>> Thanks
>> Rajendra Prasad.Palnaty
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
FD1D E574 6CAB 2FAF 2921  F22E B8B7 9D0D 99FF A73C
http://pgp.mit.edu:11371/pks/lookup?search=tbiehn&op=index&fingerprint=on
http://pastebin.com/f6fd606da
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/