CWE

Results: 336



#Item
281Software testing / Software quality / Hacking / Computer network security / Vulnerability / Software assurance / Veracode / Web application security / CWE / Computing / Computer security / Cyberwarfare

Software Security Being Explicit About Security Weaknesses Robert A. Martin MITRE Corporation

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-11-02 20:33:49
282Computer network security / Hacking / Software testing / Vulnerability / Cross-platform software / Scripting languages / Cross-site scripting / Cross-site request forgery / Buffer overflow / Cyberwarfare / Computer security / Computing

Microsoft Word - Vulnerability Type Distributions in CVE.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-06-07 12:01:36
283Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
284Software testing / Hacking / Computer network security / Cloud computing / Veracode / Vulnerability / CWE / Software quality / Buffer overflow / Computing / Software engineering / Computer security

Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:53
285Software security assurance / Common Weakness Enumeration / Security / Mitre Corporation / Fortify Software / Software assurance / National Security Agency / Evaluation / Software quality / National security / Security engineering

Being Explicit About Weaknesses Robert A. Martin - MITRE Sean Barnum - Cigital Steve Christey - MITRE 1 March 2007

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:30:15
286Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
287Latin alphabets / Speech Assessment Methods Phonetic Alphabet chart for English

Im p ro p e r ch o ice o f in itia l p ro te ctio n d o m a in i ncor r ect init ial ass i g nment of securi ty or int egri ty l evel at syst em init ial i zat i on or generation; a security critical function m anipulati

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:15
288CWE / Capability-based security / Requirement / Computing / Anticipatory thinking / Software quality / Source code

Requirements and Recommendations for CWE Compatibility and CWE Effectiveness Document version: 1.0 Date: July 28, 2011 This is a draft report and does not represent an official position of The MITRE Corporation. Copyrigh

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2013-04-02 14:04:54
289Computer network security / Hacking / Software testing / Vulnerability / Attack / Mitre Corporation / Mitre / Cyberwarfare / Computer security / Clothing

UnforgivableVulns-BH 5.ppt

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
290Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
UPDATE