Vulnerabilities are the result of bugs or failures in the design of the system, although, in a broader sense, they can also be the result of the technological limitations themselves, because, in principle, there is no 100% safe system.Therefore there are theoretical vulnerabilities and real vulnerabilities (known as exploits).
Vulnerabilities in applications are usually corrected with patches, hotfixs or with version changes, while some others require a physical change in an information system.
The vulnerabilities are discovered very often in large systems, and the fact that they are published quickly throughout the internet (long before there is a solution to the problem), is a matter of debate.A vulnerability becomes more known, the more likely there are hackers who want to take advantage of them.
Some typical vulnerabilities are usually: * Stack overflows and other buffers.* Symlink races.* Errors in the validation of entries such as: SQL injection, bug in the format of strings, etc.* Sequence of sessions.* Execution of remote code.* XSS.
See: Computer security.
Comments
Post a Comment