Abstract

AbstractThe impact of rapidly changing technology is now majorly contributing to the risk of upcoming new challenges. The advancements of computers can’t be solely blamed as the mindsets of people are becoming greedier. The hunger for finding loopholes to gain extras has made software a very exploitable platform. One of the major exploitable zones is software vulnerabilities. A defect in the software can led on an intruder to gain access to a system which can cause fatal damage to a system. In this paper, the software vulnerabilities in Adobe Photoshop are classified, which helps in building secure software. Common Weakness Enumeration (CWE) and Common Vulnerabilities and Exposures (CVE) and National Vulnerability Database (NVD) are the types of some vulnerability data including these. Wherever in design phase the mitigation was possible, only, those vulnerabilities are included. Overall, three major vulnerabilities which are buffer overflow, memory corruption, and out of bound (read and write) which are seen in Adobe Photoshop frequently are thoroughly demonstrated throughout the paper. This paper aims to showcase the effects and impacts of software vulnerabilities on any and every software. This causes major monetary losses, the risk with customer identity, and might cause treacherously. The paper aims to familiarize every user with software vulnerabilities and how a software developer can make sure that the software is secured, and vulnerabilities are mitigated.KeywordsAdobe PhotoshopCommon vulnerabilities exposureBuffer overflowMemory corruptionOut of bounds

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call