Common Vulnerabilities and Exposures

Results: 109



#Item
21Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Being Explicit about Security Weaknesses

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:31:33
22Microsoft Word - BeingExplicit_WP.doc

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
23Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner BanyanOps {www.banyanops.com, } Docker Hub is a central repos

Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner BanyanOps {www.banyanops.com, } Docker Hub is a central repos

Add to Reading List

Source URL: www.banyanops.com

Language: English - Date: 2015-05-26 16:31:11
24Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian  Abstract

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:50:49
25Mitre Corporation / Failure / Hacking / Software testing / Cross-platform software / Computer security / Cyberwarfare / Common Vulnerabilities and Exposures

A Progress Report on the CVE Initiative Robert Martin / Steven Christey / David Baker The MITRE Corporation

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:56:42
26Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian  Abstract

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.secpod.com

Language: English - Date: 2015-04-02 06:08:19
27Vulnerability / Open Vulnerability and Assessment Language / Social vulnerability / Common Vulnerabilities and Exposures / Information security / Information assurance / SAINT / Information assurance vulnerability alert / Computer security / Cyberwarfare / Security

Information Assurance Vulnerability Assessment Tool 2. Task Order Title Enterprise License for an automated Information Assurance Vulnerability Management (IAVM) Compliance Tool. Background

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:16
280-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
29The Vulnerabilities of Developing on the NET  Robert A. Martin April 2001 Published in

The Vulnerabilities of Developing on the NET Robert A. Martin April 2001 Published in

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:52:21
30PERSPECTIVES  Managing Vulnerabilities in Networked Systems

PERSPECTIVES Managing Vulnerabilities in Networked Systems

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:54:31