CWE

Results: 336



#Item
61

U n va lid a te d In p u t W eb applic ations us e input from H T T P reques ts (and oc c as ionally files ) to determ ine how to res pond. A ttac kers c an tam per with any part of an H T T P reques t, inc luding the ur

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:15
    62Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

    Microsoft Word - BeingExplicit_WP.doc

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2007-07-02 14:11:15
    63

    CWE - Introduction to Vulne...

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2009-10-29 16:20:36
      64

      Microsoft Word - Document2.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      - Date: 2006-09-13 14:57:18
        65Orthography / English orthography / Occitan phonology / Linguistics / English phonology / Language

        B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

        Add to Reading List

        Source URL: cwe.mitre.org

        Language: English - Date: 2006-09-13 14:57:15
        66

        Microsoft Word - Vulnerability Type Distributions in CVE.doc

        Add to Reading List

        Source URL: cwe.mitre.org

        Language: English - Date: 2007-06-07 12:01:36
          67

          Microsoft Word - Martin_CaseForCWEs (final+).doc

          Add to Reading List

          Source URL: cwe.mitre.org

          Language: English - Date: 2006-09-13 14:57:13
            68Latin alphabets / Speech Assessment Methods Phonetic Alphabet chart for English

            Im p ro p e r ch o ice o f in itia l p ro te ctio n d o m a in i ncor r ect init ial ass i g nment of securi ty or int egri ty l evel at syst em init ial i zat i on or generation; a security critical function m anipulati

            Add to Reading List

            Source URL: cwe.mitre.org

            Language: English - Date: 2006-09-13 14:57:15
            69

            Tra p d o o r M a licio u s L o g ic/Tim e B o m b S to ra g e C o ve rt C h a n n e l

            Add to Reading List

            Source URL: cwe.mitre.org

            Language: English - Date: 2006-09-13 14:57:23
              70

              B ru te F o rce A B rute Forc e attac k is an autom ated process of trial and error used to guess a person pas s word, c redit-card num ber or cryptographic key. s user n ame,

              Add to Reading List

              Source URL: cwe.mitre.org

              Language: English - Date: 2006-09-13 14:57:23
                UPDATE