Vulnerability database

Results: 242



#Item
201National Vulnerability Database / Vulnerability / Automation / Asset / Security Content Automation Protocol / Information Security Automation Program / Computer security / Security / Cyberwarfare

  ITL SECURITY AUTOMATION PROGRAM   NIST, in coordination with the National Security Agency, Department of Defense, Department of Homeland Security, and industry partners, has developed technical specifications for sh

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-19 15:38:00
202Schema / Database schema / Degrees of Eastern Orthodox monasticism / Information / Data / Computing / XML / Schematron / Open Vulnerability and Assessment Language

OVAL Board Minutes[removed]Attendees Jonathan Baker – MITRE Andrew Buttner – MITRE Bryan Worrell – MITRE

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2008-09-03 10:58:13
203Security / CVSS / Vulnerability / National Vulnerability Database / Application security / Attack / Social vulnerability / Patch / Security Content Automation Protocol / Computer security / Cyberwarfare / Computer network security

NISTIR 7502, The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-29 19:22:43
204Mitre Corporation / Open Vulnerability and Assessment Language / Markup languages / Technical communication / XML / Database schema / XML Schema / Computing / Web standards / Information

OVAL Integration and Automation Andrew Buttner September 19, 2006

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
205Security Content Automation Protocol / CVSS / Vulnerability / Extensible Configuration Checklist Description Format / Open Vulnerability and Assessment Language / Malware / Qualys / National Vulnerability Database / Information Security Automation Program / Computer security / Cyberwarfare / Security

Security Content Automation Protocol and What It Means to Information Assurance

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
206Oracle Database / Oracle Corporation / Vulnerability / Patch / Software / Computing / Cross-platform software

Recommendations for Leveraging the Critical Patch Update and Maintaining a Proper Security Posture

Add to Reading List

Source URL: www.oracle.com

Language: English
207Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
208Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
209Security / Cyberwarfare / Data quality / Vulnerability / Database / Fault / Referential integrity / Integrity / Fault injection / Database management systems / Software testing / Computer security

A TAXONOMY OF SECURITY FAULTS IN THE UNIX OPERATING SYSTEM A Thesis Submitted to the Faculty of Purdue University by

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2008-10-29 17:41:00
210Security / Common Vulnerabilities and Exposures / Computer network security / Software testing / Hacking / Security Content Automation Protocol / Vulnerability / National Vulnerability Database / Open Vulnerability and Assessment Language / Computer security / Cyberwarfare / Mitre Corporation

Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:53
UPDATE