Have a look at http://www.securityfocus.com/archive/1
and if you can get some sample exploit code and study it.
Then perhaps study some of your own programs with a more devious mindset and figure out what you have forgotten to take into account.
Have a look at http://www.securityfocus.com/archive/1
and if you can get some sample exploit code and study it.
Then perhaps study some of your own programs with a more devious mindset and figure out what you have forgotten to take into account.