Download
| Alert*
2011 Top 25 - Porous Defenses
Description Weaknesses in this category are listed in the "Porous Defenses" section of the 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Applicable PlatformsNone Common ConsequencesNone Detection MethodsNone Potential MitigationsNone Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy MappingsNone References:
|