Web Results

cwe.mitre.org/data/definitions/400.html

CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') .... an attacker could consume all available connections, preventing others from ...

cwe.mitre.org/data/definitions/405.html

Technical Impact: DoS: amplification; DoS: resource consumption (other) ... An application must make resources available to a client commensurate with the ...

cwe.mitre.org/data/definitions/694.html

CWE-694: Use of Multiple Resources with Duplicate Identifier ... resources, then duplicate identifiers might allow attackers to bypass the protection. Other.

cwe.mitre.org/documents/glossary

an actor who attempts to gain access to behaviors or resources that are outside of the ... a CWE entry that contains a set of other entries that share a common characteristic. ..... More information is available — Please select a different filter.

cwe.mitre.org/data/definitions/770.html

May 13, 2009 ... CWE-770: Allocation of Resources Without Limits or Throttling ... an attacker could consume all available connections, preventing others from ...

cwe.mitre.org/data/definitions/672.html

Availability. Technical Impact: Other; DoS: crash / exit / restart. When a resource is released it might not be in an expected state, later attempts to access the ...

cwe.mitre.org/data/definitions/362.html

CWE-362: Concurrent Execution using Shared Resource with Improper ... The program contains a code sequence that can run concurrently with other .... Use a mutex if available, but be sure to avoid related weaknesses such as CWE-412.

www.sans.org/top25-software-errors

Software Error Category: Insecure Interaction Between Components (6 errors); Software Error Category: Risky Resource Management (8 errors); Software Error  ...

nvd.nist.gov/vuln/categories

Mar 28, 2017 ... A detailed CWE list is currently available at the MITRE website; this list .... Externally Controlled Reference to a Resource in Another Sphere ...

cwe.mitre.org/data/definitions/668.html

The product exposes a resource to the wrong control sphere, providing ... If the file permissions are insecure, then parties other than the user will be able to ...

Related Search