Answer the following Question :
• Please identify two types of software vulnerabilities present in insecure software applications. Describe the vulnerability and the types of attacks it encourages.
• Describe how your identified vulnerability can be eliminated through secure software development practices.