Major Vulnerabilities to Test on New Systems

This page serves as a living list of major, far-reaching vulnerabilities found in numerous/generic systems that I feel it is wise to test a new system or environment for so that steps toward mitigation can be taken and the system provision/build/setup/initial configuration can be conducted in a way that is conscious of the issue and takes whatever realities it imposes into consideration. It is by no means a comprehensive or authoritative list, just a one-stop checklist I personally use to uncover what I consider to be serious and broadly applicable weaknesses that will influence the potential use-cases in which I deploy a device or system and the level of risk and trust to be associated given where and what it is assigned to do. As with the other living lists on this site I will continue to update this page as new information and experiences influence my understanding and broaden my field of view.

Additional Resources:


There are no comments for this item.