CWE

Results: 336



#Item
51Computer network security / Software testing / National security / Secure communication / Vulnerability / Application security / Software bug / Threat / Cross-site scripting / Cyberwarfare / Computer security / Security

A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:13
52English orthography / Occitan phonology

B u ffe r O ve rflo w W riting outside the bounds of allocated m em ory can corrupt data, crash the program , or cause the execution of an attack payload. C o m m a n d In je ctio n E xecuting com m ands from an untruste

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
53Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
54Software testing / Security / Software bugs / Hacking / Vulnerability / Flaw hypothesis methodology / Penetration test / Cyberwarfare / Computer security / Computer network security

Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer Program

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:14
55

CWEC : Struts: Duplicate Validation Forms S tru ts: D u p lica te Va lid a tio n F o rm s M ultiple validation form s with the s am e nam e indic ate that validation logic is not up-to-date. S tru ts: E rro n e o u s v

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
    56Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

    Being Explicit about Security Weaknesses

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2007-07-02 14:31:33
    57Arc welding / Welder certification / Welding / Brazing

    CWI/CWE Exam Application PLEASE PRINT IN BLUE OR BLACK INK P.O. Box ¿ Miami, Fl¿ ¿ (, ext. 273 ¿ (, extTHIS APPLICATION IS FOR (CHECK ONLY ONE):

    Add to Reading List

    Source URL: mic.co.tt

    Language: English - Date: 2015-02-18 02:03:30
    58CWE / Software quality

    CWE Mapping Analysis  Introduction As CWE grows, it is important to understand how it is used, and if the usage can be affected by the amount and quality of coverage. To attempt to measure coverage, the mapping of ind

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2008-09-03 15:50:00
    59

    UnforgivableVulns-BH 5.ppt

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2007-09-13 16:51:18
      60Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

      Microsoft Word - unforgivable 3.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2007-09-13 16:51:18
      UPDATE