[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTim706pZeCDS2ak4dqB6G6KW1Azj2Zw9s_SpzmGQ@mail.gmail.com>
Date: Mon, 31 May 2010 12:27:40 -0400
From: T Biehn <tbiehn@...il.com>
To: Christian Sciberras <uuf6429@...il.com>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
rajendra prasad <rajendra.palnaty@...il.com>
Subject: Re: What are the basic vulnerabilities of a
software?
Misuse, mis-implementation of cryptographic primitives.
Errors in state based code, skipping authentication states and moving to
authenticated states, for instance.
For everything else see whatever publication.
Why did I answer this :(
-Travis
On Mon, May 31, 2010 at 8:56 AM, Christian Sciberras <uuf6429@...il.com>wrote:
> 0. Human error.
>
>
>
>
>
>
>
> On Mon, May 31, 2010 at 11:50 AM, rajendra prasad <
> rajendra.palnaty@...il.com> wrote:
>
>> Hi List,
>> I am preparing a list of main and basic vulnerabilities in software.
>> Please let me know If you know other than the below list.
>> List of Basic Vulnerabilities:
>> 1. Buffer Overflow: Stack, Heap.
>> 2. Format String Vulnerabilities
>> 3. SQL Injections
>> 4. XSS Vulnerabilities
>>
>> Thanks
>> Rajendra Prasad.Palnaty
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
--
FD1D E574 6CAB 2FAF 2921 F22E B8B7 9D0D 99FF A73C
http://pgp.mit.edu:11371/pks/lookup?search=tbiehn&op=index&fingerprint=on
http://pastebin.com/f6fd606da
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists