5198 Security Vulnerabilities tracked by US-CERT in 2005



The headline probably says most all… 5198 vulnerabilities tracked by US-Cert in 2005. This comes from The SecurityFix. It’s probably not every vulernability that was out in 2005, just those that US-CERT issued advisories for. The breakdown is 812 in Windows 2,328 in various Unix/Linux/Mac/BSD systems and 2,058 affecting multiple operating systems. It would be interesting to see a breakdown of core operating system vulnerabilities versus, addon software. One problem with this kind of breakdown is most linux distributions ship the addon software with the core operating system. That’s likely why it doesn’t get tracked that way.


In the security fix post, Brian notes that many Microsoft Windows patches seem to address multiple issues in a single patch. This has the effect of possibly downlplaying the number of announced advisories. If one fix solves 8 problems is it really only one vulnerability?

The bottom line is this though. Software has bugs, ALL software. This is one of the first things I remember being taught in an introductory programming class. These days any program that opens documents or data from another machine is potentially a security risk. In addition to any program that accepts incoming connections from other machines. That’s a bit overwhelming, but true. I suspect as the number of differnet software programs multiplies, so will the vulnerabilities. I’m afraid I don’t see ways that the potential problems go away.

Related Posts

Blog Traffic Exchange Related Posts
  • So who is behind Windows Police Pro Virus / Rogue Security Software? As I've seen the continuing FLOOD of searches for some way to Remove Windows Police Pro, I've been starting to wonder at the who is behind this particular piece of junk software. These programs aren't written by your average ordinary virus writer, there is really too much spit and polish......
  • How to Remove Internet Security 2010 | Internet Security 2010 Removal Guide Internet Security 2010 is the name of a rogue antivirus application that is one of the more recent to be making the rounds. It will typically install itself on your system through the use of other malware. These rogue antivirus applications typically will pop up warnings and alerts about the......
  • How to Remove Guard Pro | Guard Pro Removal Guide Guard Pro is a rogue antivirus application that is promoted through the use of malware and trojan horses. Once it is installed on a system it will run at startup and will scan the computer claiming to find files infected with viruses and finding security problems with your system. It......
Blog Traffic Exchange Related Websites
  • How To Choose The Best Free Registry Cleaner Software In the case you use your PC on a daily basis, then your PC’s registry is getting more entries every day as well. The registry represents a directory that is saving the settings and options for your operating system. If you are using the Windows operating system, the Registry is......
  • Article Submission Software Helps Make Work Simpler For Internet Marketers Article submission software helps make article marketing to internet directories much easier and far simpler for your company. When you have a program that may instantly submit your posts, you may attain the most effective publicity that's possible for your articles. These programs can automatically submit your article to a......
  • Most Popular and Useful Security Apps for a Smart Phone The following is a post from staff writer Crystal at Budgeting in the Fun Stuff, where she writes about finding the balance between paying your bills, saving for your future, and budgeting in the fun stuff along the way. Buying a smart phone is a major investment because you spend......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site