|
|
Line 1: |
Line 1: |
− | [http://s1.shard.jp/bireba/mac-antivirus.html panda antivirus online scan
| |
− | ] [http://s1.shard.jp/galeach/new168.html asian cac cua nuoc thu trong] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/olharder/44-auto-trader-nz.html autosomal recessive pedigree chart
| |
− | ] [http://s1.shard.jp/galeach/new151.html anastasia church st
| |
− | ] [http://s1.shard.jp/olharder/autoroll-654.html url] [http://s1.shard.jp/galeach/new73.html asian big gallery tit
| |
− | ] [http://s1.shard.jp/olharder/auto-classifieds.html thamesvalleyautotrader
| |
− | ] [http://s1.shard.jp/losaul/midas-mufflers.html dickies clothing australia
| |
− | ] [http://s1.shard.jp/olharder/auto-remer.html auto magazines india
| |
− | ] [http://s1.shard.jp/olharder/autodesk-inventor.html autometrics.net
| |
− | ] [http://s1.shard.jp/losaul/australia-british.html australia british embassy] [http://s1.shard.jp/losaul/australia-airfare.html pos system restaurant australia
| |
− | ] [http://s1.shard.jp/olharder/autoroll-654.html domain] [http://s1.shard.jp/galeach/new99.html asian gallery girl photo
| |
− | ] [http://s1.shard.jp/olharder/wes-finch-auto-plaza.html voyage en autocar
| |
− | ] [http://s1.shard.jp/olharder/auto-ordance.html auto ordance] [http://s1.shard.jp/galeach/new171.html asia human rights
| |
− | ] [http://s1.shard.jp/losaul/moosehead-beer.html australian car reviews
| |
− | ] [http://s1.shard.jp/bireba/ravantivirus.html live update symantec antivirus
| |
− | ] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/olharder/autodesk-symbols.html auto.com beck don
| |
− | ] [http://s1.shard.jp/olharder/autoroll-654.html site] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/galeach/new156.html australasian dirt bike magazine
| |
− | ] [http://s1.shard.jp/olharder/baltimore-auto.html overseas auto sales
| |
− | ] [http://s1.shard.jp/galeach/new25.html euthanasia case studys
| |
− | ] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/frhorton/gpeqnwwus.html south african newspaper
| |
− | ] [http://s1.shard.jp/frhorton/tiwomyd3z.html scholarships for african american females
| |
− | ] [http://s1.shard.jp/frhorton/91rryr9x4.html south african cricket tickets
| |
− | ] [http://s1.shard.jp/olharder/car-ezautoshippersnet.html performance plus automotive
| |
− | ] [http://s1.shard.jp/galeach/new82.html asian torrents
| |
− | ] [http://s1.shard.jp/galeach/new195.html southeast asia maps 1914
| |
− | ] [http://s1.shard.jp/galeach/new135.html asian model swim wear
| |
− | ] [http://s1.shard.jp/galeach/new43.html reward management asia
| |
− | ] [http://s1.shard.jp/losaul/australian-gold.html kas australia pty ltd
| |
− | ] [http://s1.shard.jp/olharder/automation-home.html pseudoautosomal regions
| |
− | ] [http://s1.shard.jp/frhorton/jp87fttqi.html international flight search cheap airfares africa
| |
− | ] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/galeach/new36.html asian court earl escort in london
| |
− | ] [http://s1.shard.jp/frhorton/atm6jbmgn.html africana conceito da familia
| |
− | ] [http://s1.shard.jp/olharder/cheap-auto-insurance.html autograph tamil mp3
| |
− | ] [http://s1.shard.jp/frhorton/y9ydrxv6i.html africa diversity in management south
| |
− | ] [http://s1.shard.jp/olharder/autoroll-654.html webmap] [http://s1.shard.jp/losaul/australia-from.html radio station in australia
| |
− | ] [http://s1.shard.jp/galeach/new174.html at the beginning- anastasia
| |
− | ] [http://s1.shard.jp/frhorton/4lte5ty9r.html african orthodox church
| |
− | ]
| |
− | http://www.textgetoloeltg.com
| |
| {{template:CandidateForDeletion}} | | {{template:CandidateForDeletion}} |
| | | |
Latest revision as of 19:53, 26 May 2009
Template:CandidateForDeletion
#REDIRECT : Category:Vulnerability
Last revision (mm/dd/yy): 05/26/2009
Description
A vulnerability is a weakness in an application (frequently a broken or missing control) that enables an attack to succeed. Be sure you don't put [attacks] or [controls] in this category.
- Start with a one-sentence description of the vulnerability
- What is the problem that creates the vulnerability?
- What are the attacks that target this vulnerability?
- What are the technical impacts of this vulnerability?
Risk Factors
- Talk about the factors that make this vulnerability likely or unlikely to actually happen
- Discuss the technical impact of a successful exploit of this vulnerability
- Consider the likely [business impacts] of a successful attack
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: