lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTikTZ9HqSwa_ngcuJid0yMGw0KDAWxdarxeyS87H@mail.gmail.com>
Date: Mon, 31 May 2010 16:48:54 -0400
From: Jeffrey Walton <noloader@...il.com>
To: rajendra prasad <rajendra.palnaty@...il.com>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: What are the basic vulnerabilities of a
	software?

Hi Rajendra,

> I am preparing a list of main and basic vulnerabilities in software.
Pick up the latest copy of "24 Deadly Sins of Software Security:
Programming Flaws and How to Fix Them" [1]. Howard, LeBlanc, and Viega
added 6 to the list since the 2005 revision.

Jeff

[1] http://www.amazon.com/Deadly-Sins-Software-Security-Programming/dp/0071626751/

On Mon, May 31, 2010 at 5:50 AM, rajendra prasad
<rajendra.palnaty@...il.com> wrote:
> Hi List,
> I am preparing a list of main and basic vulnerabilities in software. Please
> let me know If you know other than the below list.
> List of Basic Vulnerabilities:
> 1. Buffer Overflow: Stack, Heap.
> 2. Format String Vulnerabilities
> 3. SQL Injections
> 4. XSS Vulnerabilities
>
> Thanks
> Rajendra Prasad.Palnaty
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ