|
|
(2 intermediate revisions by 2 users not shown) |
Line 1: |
Line 1: |
− | [http://s1.shard.jp/galeach/new162.html asian escort girl london
] [http://s1.shard.jp/frhorton/obe78uzn9.html african funeral ritual
] [http://s1.shard.jp/losaul/this-day-in-australian.html west australian landlord forms
] [http://s1.shard.jp/losaul/limousine-hire.html motorhome travel in australia
] [http://s1.shard.jp/olharder/michigan-auto.html auto with third row seating
] [http://s1.shard.jp/olharder/autoroll-654.html site] [http://s1.shard.jp/bireba/antivirus-tests.html small antivirus program
] [http://s1.shard.jp/bireba/window-security.html remove norton antivirus 2004
] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/olharder/autorizadas.html us automakers
] [http://s1.shard.jp/bireba/antivirusreviews.html lu1803 norton antivirus
] [http://s1.shard.jp/frhorton/tyyykyebz.html dancing skeleton life and death in west africa
] [http://s1.shard.jp/bireba/norton-antivirus.html comparaison antivirus
] [http://s1.shard.jp/bireba/norton-antivirus.html best antivirus programs 2005
] [http://s1.shard.jp/frhorton/vuku1m6uz.html africa history togo] [http://s1.shard.jp/olharder/nada-used-auto.html american auto consultants inc.
] [http://s1.shard.jp/frhorton/t23vzwbje.html south african business schools
] [http://s1.shard.jp/olharder/auto-benz-dealer.html autocar montreal
] [http://s1.shard.jp/bireba/symantec-antivirus.html os x antivirus free
] [http://s1.shard.jp/bireba/norton-antivirus.html reviews antivirus programs
] [http://s1.shard.jp/galeach/new47.html largest desert in asia
] [http://s1.shard.jp/losaul/2nd-hand-books.html australian cow dogs
] [http://s1.shard.jp/bireba/panda-antivirus.html panda antivirus titanium] [http://s1.shard.jp/olharder/baltimore-auto.html overseas auto sales
] [http://s1.shard.jp/losaul/australia-installation.html what is boxing day in australia
] [http://s1.shard.jp/bireba/mobile-antivirus.html mobile antivirus software] [http://s1.shard.jp/galeach/new62.html asian dolls uncut 19
] [http://s1.shard.jp/olharder/autoroll-654.html domain] [http://s1.shard.jp/losaul/ozone-therapy-australia.html glue clothing store australia
] [http://s1.shard.jp/losaul/australian-laws.html australian fact book
] [http://s1.shard.jp/frhorton/fhh2j9s8e.html africa civilization cradle
] [http://s1.shard.jp/frhorton/1oj3zcvfn.html african american baptist history
] [http://s1.shard.jp/frhorton/l648khtsn.html adopting africa child from
] [http://s1.shard.jp/olharder/auto-calculator.html autocad symbols 2000
] [http://s1.shard.jp/olharder/auto-automobile.html autoplay menu builder v4.2 crack
] [http://s1.shard.jp/losaul/miniature-australian.html need a ride australia
] [http://s1.shard.jp/frhorton/1jtffm4w8.html african american dick man
] [http://s1.shard.jp/losaul/australian-citizenship.html australia insurance mortgage
] [http://s1.shard.jp/olharder/automation-home.html automation home wholesale] [http://s1.shard.jp/galeach/new140.html akasia mangium
] [http://s1.shard.jp/olharder/accessory-automotive.html automobile future trend
] [http://s1.shard.jp/bireba/antivirus-small.html house call antivirus free
] [http://s1.shard.jp/galeach/new13.html venulectasia
] [http://s1.shard.jp/bireba/microworld-antivirus.html simworks antivirus s60
] [http://s1.shard.jp/bireba/dod-cert-antivirus.html panda antivirus free download
] [http://s1.shard.jp/olharder/autoextracom.html peoria illinois auto detailing
] [http://s1.shard.jp/olharder/aa-auto-route-planner.html aa auto route planner uk] [http://s1.shard.jp/olharder/download-autoroute.html auto california loan title
] [http://s1.shard.jp/bireba/panda-free-antivirus.html avast antivirus serial
] [http://s1.shard.jp/frhorton/2tqspott4.html africa east fact kenya
]
| |
| {{template:CandidateForDeletion}} | | {{template:CandidateForDeletion}} |
| | | |
Latest revision as of 12:50, 3 June 2009
Template:CandidateForDeletion
#REDIRECT Failure_to_follow_guideline/specification
Last revision (mm/dd/yy): 06/3/2009
Description
A vulnerability is a weakness in an application (frequently a broken or missing control) that enables an attack to succeed. Be sure you don't put [attacks] or [controls] in this category.
- Start with a one-sentence description of the vulnerability
- What is the problem that creates the vulnerability?
- What are the attacks that target this vulnerability?
- What are the technical impacts of this vulnerability?
"..\filename"
Risk Factors
- Talk about the factors that make this vulnerability likely or unlikely to actually happen
- Discuss the technical impact of a successful exploit of this vulnerability
- Consider the likely [business impacts] of a successful attack
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: