Common Vulnerabilities and Exposures

Results: 109



#Item
51Continuous Diagnostics and Mitigation (CDM) CDM Training Modules September 29, 2014 Version[removed]

Continuous Diagnostics and Mitigation (CDM) CDM Training Modules September 29, 2014 Version[removed]

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-10-08 14:30:53
52CDM Vulnerability Management (VUL) Capability

CDM Vulnerability Management (VUL) Capability

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-03-19 13:27:02
53VULN Capability Description v2

VULN Capability Description v2

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:38:29
54VULN Capability Data Sheet v2  October 8, 2014 Manage Vulnerabilities (VULN) Capability Data Sheet Desired State:

VULN Capability Data Sheet v2 October 8, 2014 Manage Vulnerabilities (VULN) Capability Data Sheet Desired State:

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:38:35
55The Heartbleed Security Incident You may have heard that vulnerability in the OpenSSL cryptographic library called Heartbleed or formally called CVE[removed]has been disclosed and that it represents a potential securit

The Heartbleed Security Incident You may have heard that vulnerability in the OpenSSL cryptographic library called Heartbleed or formally called CVE[removed]has been disclosed and that it represents a potential securit

Add to Reading List

Source URL: www.merchantconnect.com

Language: English - Date: 2014-11-17 16:09:02
56Some Vulnerabilities Are Different Than Others Studying Vulnerabilities and Attack Surfaces in the Wild Kartik Nayak* , Daniel Marino† , Petros Efstathopoulos† , Tudor Dumitras, * *  University of Maryland, College P

Some Vulnerabilities Are Different Than Others Studying Vulnerabilities and Attack Surfaces in the Wild Kartik Nayak* , Daniel Marino† , Petros Efstathopoulos† , Tudor Dumitras, * * University of Maryland, College P

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2014-11-07 18:41:40
57Canadian Numbering Administration Consortium / Marketing / Request for proposal / China National Aviation Corporation / Common Vulnerabilities and Exposures / Numbering Resource Utilization/Forecast Report / 555 / Proposal / Business / Sales / North American Numbering Plan

DOC Document

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2002-08-19 13:32:46
58North American Numbering Plan / Telephone numbering plan / Routing / Common Vulnerabilities and Exposures / Telephone exchange / Telephone numbers / Numbers / Telcordia LERG Routing Guide

WORKING GROUP: Canadian Steering Committee on Numbering (CSCN) TASK: TIF 88

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2014-06-05 15:13:22
59Common Configuration Enumeration — CCE™ Standardized Identifiers for Security Configuration Issues and Exposures CCE provides unique identifiers  Why CCE

Common Configuration Enumeration — CCE™ Standardized Identifiers for Security Configuration Issues and Exposures CCE provides unique identifiers Why CCE

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2012-06-07 15:22:57
60Common Vulnerabilities and Exposures  With CVE Without CVE IBM

Common Vulnerabilities and Exposures With CVE Without CVE IBM

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

- Date: 2013-07-08 14:41:52