Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
u
- Uncontrolled Resource Consumption Description: Uncontrolled resource consumption is a vulnerability that allows an attacker to exhaust a system's resources, such as CPU, memory,(...) Read more
- Untrusted Input Description: The 'Untrusted Input' refers to data or information that comes from sources that have not been verified or are not considered(...) Read more
- User Interface Vulnerability Description: User interface vulnerability refers to weaknesses in how interactions are presented and managed in applications or systems. These(...) Read more
- Untrusted Certificates Description: Untrusted certificates are those that have not been verified by a recognized certificate authority, posing a significant risk to(...) Read more
- Unintentional Data Leak Description: Unintentional data leakage refers to the accidental exposure of sensitive information due to misconfigurations, human errors, or(...) Read more
- Unsecured API Description: An unsecured API is an application programming interface that lacks adequate security measures to protect data and interactions(...) Read more
- Unusual Network Activity Description: Unusual Network Activity refers to network traffic behaviors that deviate from established norms, which can indicate a security(...) Read more
- Unforeseen Vulnerability Description: The 'Unforeseen Vulnerability' refers to a security flaw that was not anticipated during the development or evaluation phases of a(...) Read more
- User Feedback Exploitation Description: User Feedback Exploitation refers to the practice of using user feedback mechanisms to identify and exploit vulnerabilities in a(...) Read more
- Unstable Software Description: The term 'Unstable Software' refers to programs or applications that are prone to failures or unexpected behaviors, which can lead(...) Read more
- Unauthorized Changes Description: Unauthorized Changes refer to modifications made to a computer system without the proper authorization from the system(...) Read more
- User Account Compromise Description: User account compromise refers to the situation where a user account is accessed by an unauthorized party, which can result in the(...) Read more
- Usage Data Description: Usage data refers to the information collected that tracks the usage patterns of a system or application. This data is essential(...) Read more
- Univariate analysis Description: Univariate analysis is a statistical method that focuses on the study of a single variable at a time. Its main objective is to(...) Read more
- Underfitting Description: Underfitting is a modeling error that occurs when a model is too simple to capture the underlying trend of the data. This(...) Read more