<--- Back to Details
First PageDocument Content
Software testing / Hacking / Cross-site scripting / Attack patterns / Vulnerability / Code injection / SQL injection / Buffer overflow / Cross-site request forgery / Cyberwarfare / Computer security / Computing
Date: 2011-03-29 14:10:53
Software testing
Hacking
Cross-site scripting
Attack patterns
Vulnerability
Code injection
SQL injection
Buffer overflow
Cross-site request forgery
Cyberwarfare
Computer security
Computing

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Download Document from Source Website

File Size: 514,66 KB

Share Document on Facebook

Similar Documents

2016 IEEE International Conference on Software Science, Technology and Engineering Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis Ariel Bar, Bracha Shapi

DocID: 1v095 - View Document

Attack Surface Reduction for Web Services based on Authorization Patterns Roland Steinegger, Johannes Schäfer, Max Vogler, and Sebastian Abeck Research Group Cooperation & Management (C&M) Karlsruhe Institute of Technol

DocID: 1uI3e - View Document

Computational linguistics / Linguistics / Applied linguistics / Computer security / Cryptography / Word-sense disambiguation / Password / Security / Part-of-speech tagging / WordNet / Natural language processing / Dictionary attack

On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

DocID: 1qdB7 - View Document

D12 / Eminem / Dice / D3 road

Resplendent in silks and hennaed patterns, radiant Some chart results also alter the attack dice. Those with gilded hooves and tusks, the animals are led marked with + indicate one die higher up the into the amphitheater

DocID: 1pM0H - View Document

Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

DocID: 1oyCd - View Document