Vulnerability database

Results: 242



#Item
201   ITL SECURITY AUTOMATION PROGRAM   NIST, in coordination with the National Security Agency, Department of Defense, Department of Homeland Security, and industry partners, has developed technical specifications for sh

  ITL SECURITY AUTOMATION PROGRAM   NIST, in coordination with the National Security Agency, Department of Defense, Department of Homeland Security, and industry partners, has developed technical specifications for sh

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-19 15:38:00
202OVAL Board Minutes[removed]Attendees Jonathan Baker – MITRE Andrew Buttner – MITRE Bryan Worrell – MITRE

OVAL Board Minutes[removed]Attendees Jonathan Baker – MITRE Andrew Buttner – MITRE Bryan Worrell – MITRE

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2008-09-03 10:58:13
203NISTIR 7502, The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities

NISTIR 7502, The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-29 19:22:43
204OVAL Integration and Automation Andrew Buttner September 19, 2006

OVAL Integration and Automation Andrew Buttner September 19, 2006

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
205Security Content Automation Protocol and What It Means to Information Assurance

Security Content Automation Protocol and What It Means to Information Assurance

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
206Recommendations for Leveraging the Critical Patch Update and Maintaining a Proper Security Posture

Recommendations for Leveraging the Critical Patch Update and Maintaining a Proper Security Posture

Add to Reading List

Source URL: www.oracle.com

Language: English
207CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
208=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
209A TAXONOMY OF SECURITY FAULTS IN THE UNIX OPERATING SYSTEM A Thesis Submitted to the Faculty of Purdue University by

A TAXONOMY OF SECURITY FAULTS IN THE UNIX OPERATING SYSTEM A Thesis Submitted to the Faculty of Purdue University by

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2008-10-29 17:41:00
210Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:53