473,396 Members | 1,838 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

vulnerabilities

Hello

I want to make a list of all the vulnerabilities in C/C++.
I am aware of bufferoverflow/heapoverflow/race conditions/format string bugs/
Off-by-one/ numeric under- and overflow/ unsigned-signed mismatch

Are there other vulnerabilities in c/c++??

thx
Jul 22 '05 #1
5 1554
"wijhierbeneden" <wi************@hotmail.com> wrote in message
news:23************************@posting.google.com ...
Hello

I want to make a list of all the vulnerabilities in C/C++.
There are no vulnerabilities at all in a nonexistent language.
I am aware of bufferoverflow/heapoverflow/race conditions/format string bugs/ Off-by-one/ numeric under- and overflow/ unsigned-signed mismatch

Are there other vulnerabilities in c/c++??


The largest vulnerability of C++ (the only language which is topical
here), or any other language, is the fact that it is accessible to humans.

-Mike
Jul 22 '05 #2
Mike Wahler posted:
"wijhierbeneden" <wi************@hotmail.com> wrote in message
news:23************************@posting.google.com ...
Hello

I want to make a list of all the vulnerabilities in C/C++.


There are no vulnerabilities at all in a nonexistent language.
I am aware of bufferoverflow/heapoverflow/race conditions/format
string bugs/ Off-by-one/ numeric under- and overflow/ unsigned-signed
mismatch

Are there other vulnerabilities in c/c++??


The largest vulnerability of C++ (the only language which is topical
here), or any other language, is the fact that it is accessible to
humans.

-Mike

"Vulnerabilities".

Some-one needs a Thesaurus! Sure, there's things one must be particular
about, but these are in no way vulnerabilities! Intricacies maybe?

C is off-topic here.

"C/C++" is just asking for trouble. I drove my car/boat to work today.
-JKop
Jul 22 '05 #3
JKop wrote:
"Vulnerabilities".

Some-one needs a Thesaurus! Sure, there's things one must be particular
about, but these are in no way vulnerabilities! Intricacies maybe?

C is off-topic here.

"C/C++" is just asking for trouble. I drove my car/boat to work today.


You have an amphibian vehicle?

*scnr*

Jul 22 '05 #4
Rolf Magnus wrote:
"C/C++" is just asking for trouble. I drove my car/boat to work today.

You have an amphibian vehicle?

*scnr*

Good one. :-)

--
Ioannis Vranos

http://www23.brinkster.com/noicys
Jul 22 '05 #5
Mike Wahler <mk******@mkwahler.net> spoke thus:
The largest vulnerability of C++ (the only language which is topical
here), or any other language, is the fact that it is accessible to humans.


How about that they're created by humans? Combine the two, and
disaster is sure to ensue...

--
Christopher Benson-Manica | I *should* know what I'm talking about - if I
ataru(at)cyberspace.org | don't, I need to know. Flames welcome.
Jul 22 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Dave Turner | last post by:
has anyone ever put together a list of somewhat-common things/mistakes that PHP coders should be aware of to help ensure that they dont accidentally open up their script to vulnerabilities?
72
by: wijhierbeneden | last post by:
Hello I want to make a list of all the vulnerabilities in C/C++. I am aware of bufferoverflow/heapoverflow/race conditions/format string bugs/ Off-by-one/ numeric under- and overflow/...
3
by: Nanda | last post by:
Hi, Can some please provide me tips on securing the ASP application from the below vulnerabilities? · Cross Site Scripting (XSS) Findings · Cross Site Tracing - Trace Method...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.