Misuse, mis-implementation of cryptographic primitives. Errors in state based code, skipping authentication states and moving to authenticated states, for instance.
For everything else see whatever publication. Why did I answer this :( -Travis On Mon, May 31, 2010 at 8:56 AM, Christian Sciberras <[email protected]>wrote: > 0. Human error. > > > > > > > > On Mon, May 31, 2010 at 11:50 AM, rajendra prasad < > [email protected]> wrote: > >> Hi List, >> I am preparing a list of main and basic vulnerabilities in software. >> Please let me know If you know other than the below list. >> List of Basic Vulnerabilities: >> 1. Buffer Overflow: Stack, Heap. >> 2. Format String Vulnerabilities >> 3. SQL Injections >> 4. XSS Vulnerabilities >> >> Thanks >> Rajendra Prasad.Palnaty >> >> _______________________________________________ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ >> > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- FD1D E574 6CAB 2FAF 2921 F22E B8B7 9D0D 99FF A73C http://pgp.mit.edu:11371/pks/lookup?search=tbiehn&op=index&fingerprint=on http://pastebin.com/f6fd606da
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
