Many cyber-attacks happen because of vulnerabilities in a system or application software. Buffer Overflow, SQL Injection, Code/OS Command Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery and Race Conditions are very common vulnerabilities as noted on these sites:
- NIST National Vulnerability Database (Links to an external site.)
- CWE – Common Weakness Enumeration (Links to an external site.)
In this discussion, explain a specific vulnerability and describe a famous attack that leveraged it. For example, the Morris worm leveraged the buffer overflow vulnerability. Include in your post how the vulnerability can be prevented or minimized. Your post can either discuss a new vulnerability, or expand upon what someone has already posted.