CWE

Results: 336



#Item
51A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:13
52B u ffe r O ve rflo w W riting outside the bounds of allocated m em ory can corrupt data, crash the program , or cause the execution of an attack payload. C o m m a n d In je ctio n E xecuting com m ands from an untruste

B u ffe r O ve rflo w W riting outside the bounds of allocated m em ory can corrupt data, crash the program , or cause the execution of an attack payload. C o m m a n d In je ctio n E xecuting com m ands from an untruste

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
53=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
54Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer Program

Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer Program

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:14
55CWEC : Struts: Duplicate Validation Forms  S tru ts: D u p lica te Va lid a tio n F o rm s M ultiple validation form s with the s am e nam e indic ate that validation logic is not up-to-date.  S tru ts: E rro n e o u s v

CWEC : Struts: Duplicate Validation Forms S tru ts: D u p lica te Va lid a tio n F o rm s M ultiple validation form s with the s am e nam e indic ate that validation logic is not up-to-date. S tru ts: E rro n e o u s v

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
    56Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

    Being Explicit about Security Weaknesses

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2007-07-02 14:31:33
    57CWI/CWE Exam Application PLEASE PRINT IN BLUE OR BLACK INK P.O. Box ¿ Miami, Fl¿ ¿ (, ext. 273 ¿ (, extTHIS APPLICATION IS FOR (CHECK ONLY ONE):

    CWI/CWE Exam Application PLEASE PRINT IN BLUE OR BLACK INK P.O. Box ¿ Miami, Fl¿ ¿ (, ext. 273 ¿ (, extTHIS APPLICATION IS FOR (CHECK ONLY ONE):

    Add to Reading List

    Source URL: mic.co.tt

    Language: English - Date: 2015-02-18 02:03:30
    58CWE Mapping Analysis  Introduction As CWE grows, it is important to understand how it is used, and if the usage can be affected by the amount and quality of coverage. To attempt to measure coverage, the mapping of ind

    CWE Mapping Analysis  Introduction As CWE grows, it is important to understand how it is used, and if the usage can be affected by the amount and quality of coverage. To attempt to measure coverage, the mapping of ind

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2008-09-03 15:50:00
    59UnforgivableVulns-BH 5.ppt

    UnforgivableVulns-BH 5.ppt

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2007-09-13 16:51:18
      60Microsoft Word - unforgivable 3.doc

      Microsoft Word - unforgivable 3.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2007-09-13 16:51:18