Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
o
- Open Vulnerability Assessment System Description: The Open Vulnerability Assessment System is an open-source framework designed to facilitate the identification and assessment of(...) Read more
- OWASP Description: OWASP, which stands for Open Web Application Security Project, is a non-profit organization dedicated to improving software(...) Read more
- Operating System Vulnerability Description: Operating system vulnerability refers to inherent weaknesses in the software that manages a computer's hardware. These weaknesses(...) Read more
- Overexposed Data Description: ‘Overexposed Data’ refers to information that is accessible to unauthorized users due to incorrect configurations in storage(...) Read more
- Open Source Software Vulnerability Description: Open source software vulnerability refers to weaknesses or security flaws that can be found in programs whose source code is(...) Read more
- Overprivileged Accounts **Description:** Overprivileged accounts are user accounts that have more permissions than necessary to perform their specific functions within(...) Read more
- OAuth Vulnerabilities Description: OAuth vulnerabilities refer to security weaknesses in the OAuth protocol, which is an open standard for secure authorization of(...) Read more
- OpenSSL Vulnerabilities Description: OpenSSL vulnerabilities refer to security flaws found in the OpenSSL software library, which is widely used to implement security(...) Read more
- Overhead Vulnerabilities Description: Overhead vulnerabilities are security flaws that arise when a system consumes excessive resources or fails to manage workload(...) Read more
- Outdated Protocols Description: Outdated protocols are communication standards that have become obsolete and are therefore no longer considered safe for use in(...) Read more
- Open Web Application Security Testing Description: Open Web Application Security Testing is a testing methodology focused on identifying vulnerabilities in web applications. These(...) Read more
- Overexposed Services Description: Overexposed Services refer to those services on a network that are accessible to unauthorized users, significantly increasing the(...) Read more
- Open API Vulnerabilities Description: Open API vulnerabilities refer to security issues that can be exploited in application programming interfaces (APIs) designed to be(...) Read more
- Overlapping Security Controls Description: Overlapping security controls refer to the implementation of multiple layers of security measures within a system or infrastructure(...) Read more
- OLAP Description: OLAP, or Online Analytical Processing, is a category of software technology designed to facilitate the analysis of multidimensional(...) Read more