Common Vulnerabilities and Exposures

Results: 109



#Item
21Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Being Explicit about Security Weaknesses

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:31:33
22Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
23Common Vulnerabilities and Exposures / Mitre Corporation / Debian / Vulnerability / Advanced Packaging Tool / Pwnie Awards / Software / Cyberwarfare / Computer security

Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner BanyanOps {www.banyanops.com, } Docker Hub is a central repos

Add to Reading List

Source URL: www.banyanops.com

Language: English - Date: 2015-05-26 16:31:11
24Security Content Automation Protocol / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Adobe Flash / Adobe Acrobat / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Metadata / Software / Computing / Computer security

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:50:49
25Mitre Corporation / Failure / Hacking / Software testing / Cross-platform software / Computer security / Cyberwarfare / Common Vulnerabilities and Exposures

A Progress Report on the CVE Initiative Robert Martin / Steven Christey / David Baker The MITRE Corporation

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:56:42
26Security Content Automation Protocol / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Adobe Flash / Adobe Acrobat / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Metadata / Software / Computing / Computer security

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.secpod.com

Language: English - Date: 2015-04-02 06:08:19
27Vulnerability / Open Vulnerability and Assessment Language / Social vulnerability / Common Vulnerabilities and Exposures / Information security / Information assurance / SAINT / Information assurance vulnerability alert / Computer security / Cyberwarfare / Security

Information Assurance Vulnerability Assessment Tool 2. Task Order Title Enterprise License for an automated Information Assurance Vulnerability Management (IAVM) Compliance Tool. Background

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:16
28Software testing / Hacking / Vulnerability / Zero-day attack / Patch / Social vulnerability / Common Vulnerabilities and Exposures / Exploit / Responsible disclosure / Computer security / Cyberwarfare / Computer network security

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
29Hacking / Computer network security / Mitre Corporation / Software testing / Common Vulnerabilities and Exposures / Vulnerability / White hat / Hacker / Social vulnerability / Computer security / Cyberwarfare / Security

The Vulnerabilities of Developing on the NET Robert A. Martin April 2001 Published in

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:52:21
30Security / Software testing / Mitre Corporation / Hacking / Common Vulnerabilities and Exposures / Vulnerability / Attack / Qualys / SecurityFocus / Computer security / Cyberwarfare / Computer network security

PERSPECTIVES Managing Vulnerabilities in Networked Systems

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:54:31
UPDATE