CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org. International in scope and free for public use, CWE™ provides a unified, measurable set of ...
http://cwe.mitre.org/
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
|
Stack Overflow
A language-independent collaboratively edited question and answer site for programmers.
similarity:
popularity:
programming
reference
development
software
tips
community
stackoverflow
technology
howto
forum
|
National Vulnerability Database Home
Comprehensive CVE vulnerability database that integrates all U.S. Government publicly available vulnerability resources. ...
similarity:
popularity:
security
vulnerability
database
reference
government
hacking
vulnerabilities
computer
tools
internet
|
VulnerabilityAssessment.co.uk
... Web Local. Welcome to VulnerabilityAssessment.co.uk - Hopefully a valuable information source for ... SecurityFocus. The Register © VulnerabilityAssessment.co.uk ...
similarity:
popularity:
security
pentest
vulnerability
hacking
reference
tools
penetration
network
testing
software
|
Software Quality and Security Analysis | Coverity
Static source code analysis, static analysis using software quality products to find critical software defects in system architecture & source code programming. ...
similarity:
popularity:
software
programming
testing
tools
analysis
development
security
code
staticanalysis
quality
|
The Art of Software Security Assessment
Continued ramblings on software security and code auditing ... I always find these types of bugs interesting because they require such unique ...
similarity:
popularity:
security
blog
programming
software
auditing
code
books
research
blogs
book
|
Zero Day Initiative
No information avaiable
similarity:
popularity:
security
hacking
research
vulnerability
exploits
exploit
hacks
reference
programming
web
|
Qualys, Inc. - On Demand Vulnerability Management and Policy Compliance
Qualys, Inc. provides on demand vulnerability management and policy compliance solutions help ... Laws.Qualys.com. Top 10 Vulnerabilities. More Security Alerts ...
similarity:
popularity:
security
vulnerability
tools
software
network
compliance
saas
testing
pentest
networking
|
Category:OWASP Top Ten Project - OWASP
No information avaiable
similarity:
popularity:
security
web
owasp
programming
development
software
hacking
php
webdev
top10
|
David A. Wheeler's Personal Home Page
You are viewing http://www.dwheeler.com; the mark is attached to my most popular ... The terms dwheeler.com (TM) and www.dwheeler.com (TM) are trademarks of David ...
similarity:
popularity:
security
programming
opensource
software
linux
people
blog
development
technology
oss
|
milw0rm - exploits : vulnerabilities : videos : papers : shellcode
milw0rm exploits and 0day exploits database ... send all submissions to submit[at]milw0rm.com [gpg] Videos hosted by Tradebit file hosting ...
similarity:
popularity:
security
hacking
exploits
hack
exploit
vulnerabilities
reference
tools
programming
code
|