It is indispensable in case of developing a critical application that has to have proper protection against outsider attacks. In order to satisfy this need, occur of security flaws must be prevented not only in the design, but in the implementation phase too. So as to the smooth ongoing of this process firstly these security vulnerabilities, which can be exploited by vicious users have to be recognized. Therefore the coding paranoia could be raised to an appropriate level, this way the application and the source code contains less flaws.
I started my thesis with the investigation of security flaw categorizations created by several consortiums and establishments, whereby taxonomy can be created that is the most eligible for the purpose. I choose the most relevant and most often occurring vulnerabilities which are involved in the categorizations. I created an example application for all vulnerability in order to demonstrate and compare the harm factor of these, and to present the different attacking techniques.
In the first part of my thesis, I provide an overview of affects and harms can be caused by hacker attacks. Later on I specify the established taxonomy and the chosen vulnerabilities, and then I present one by one the significance of these using a Proof of Concept application.