|
|
Line 1: |
Line 1: |
− | [http://s1.shard.jp/frhorton/sfzdbdq5w.html north african cuisine] [http://s1.shard.jp/olharder/autoroll-654.html site] [http://s1.shard.jp/galeach/new126.html example of euthanasia
] [http://s1.shard.jp/frhorton/ufkvsduv1.html new african american hairstyles
] [http://s1.shard.jp/losaul/australian-vets.html conversion of euros to australian dollars
] [http://s1.shard.jp/frhorton/lpujl5mms.html africa people search south
] [http://s1.shard.jp/galeach/new72.html asian chicken noodle soup recipe
] [http://s1.shard.jp/galeach/new179.html asian daily free movie updated
] [http://s1.shard.jp/frhorton/5hrrb99yl.html downhill adventures south africa
] [http://s1.shard.jp/losaul/save-the-children.html register australian domains
] [http://s1.shard.jp/losaul/planes-for-sale.html map sydney australia airport
] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/losaul/australian-walkabout.html decking australia
] [http://s1.shard.jp/losaul/mudgee-australia.html mudgee australia] [http://s1.shard.jp/olharder/bank-auto-repos.html nc state auto inspection
] [http://s1.shard.jp/olharder/autodesk-inventor.html auto lock pro review
] [http://s1.shard.jp/galeach/new71.html plantasia bonsai] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/frhorton/vuku1m6uz.html south africa air cargo
] [http://s1.shard.jp/bireba/g-data-antivirus.html mcafee antivirus programs
] [http://s1.shard.jp/bireba/antivirus-software.html norton antivirus serial crack
] [http://s1.shard.jp/olharder/tactical-automated.html how auto insurance companies determine your premium
] [http://s1.shard.jp/bireba/norton-antivirus.html antivirusprogramma
] [http://s1.shard.jp/losaul/upstream-petroleum.html australias funniest home video
] [http://s1.shard.jp/bireba/alertas-antivirus.html norton antivirus 2004 crack serial
] [http://s1.shard.jp/bireba/norton-antivirus.html mccaffrey antivirus
] [http://s1.shard.jp/frhorton/ru5u87lsh.html africa combined force horn joint task
] [http://s1.shard.jp/galeach/new186.html asian car models
] [http://s1.shard.jp/olharder/automobile-accident.html automobile dealer dodge part
] [http://s1.shard.jp/bireba/nortons-antivirus.html symantec antivirus corporate edition 10.0 2.2000
] [http://s1.shard.jp/losaul/china-export-to.html oz experience australia
] [http://s1.shard.jp/olharder/auto-bap.html automatic gate opener
] [http://s1.shard.jp/galeach/new111.html dichromasia
] [http://s1.shard.jp/losaul/australian-laws.html capital australia 1900
] [http://s1.shard.jp/losaul/port-hedlund-australia.html pheromone trap heliothis australia
] [http://s1.shard.jp/olharder/aaa-auto-sales.html grand heft auto
] [http://s1.shard.jp/bireba/clamav-antivirus.html norton antivirus 2004 crack serial
] [http://s1.shard.jp/losaul/desert-map-of-australia.html ensemble theatre sydney australia
] [http://s1.shard.jp/losaul/job-agencies-sydney.html australian creeper jeepers
] [http://s1.shard.jp/bireba/quickheal-antivirus.html unistall norton antivirus 2005
] [http://s1.shard.jp/olharder/pyles-auto-sales.html expressway autoworld
] [http://s1.shard.jp/galeach/new180.html asian gils
] [http://s1.shard.jp/frhorton/4klamxahb.html africa photography
] [http://s1.shard.jp/galeach/new64.html asian escort jersey new] [http://s1.shard.jp/galeach/new143.html asian lacquer boxes
] [http://s1.shard.jp/olharder/autoroll-654.html url] [http://s1.shard.jp/olharder/autoridad-nacional.html ps2 grand theft auto san andreas cheat code
] [http://s1.shard.jp/frhorton/lmi1tnyfh.html african bbc news soccer
] [http://s1.shard.jp/losaul/australia-importing.html cyndis list australia
]
| |
| http://www.textchidomcc.com | | http://www.textchidomcc.com |
| {{template:CandidateForDeletion}} | | {{template:CandidateForDeletion}} |
Revision as of 15:59, 27 May 2009
http://www.textchidomcc.com
Template:CandidateForDeletion
#REDIRECT Failure_to_follow_guideline/specification
Last revision (mm/dd/yy): 05/27/2009
Description
A vulnerability is a weakness in an application (frequently a broken or missing control) that enables an attack to succeed. Be sure you don't put [attacks] or [controls] in this category.
- Start with a one-sentence description of the vulnerability
- What is the problem that creates the vulnerability?
- What are the attacks that target this vulnerability?
- What are the technical impacts of this vulnerability?
Risk Factors
- Talk about the factors that make this vulnerability likely or unlikely to actually happen
- Discuss the technical impact of a successful exploit of this vulnerability
- Consider the likely [business impacts] of a successful attack
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: