• according to the Common Vulnerability Scoring System (CVSS) and added to vulnerability databases such as the Common Vulnerabilities and Exposures (CVE) database...
    27 KB (3,333 words) - 03:19, 9 June 2025
  • In computer security, coordinated vulnerability disclosure (CVD, sometimes known as responsible disclosure) is a vulnerability disclosure model in which...
    11 KB (903 words) - 12:25, 27 May 2025
  • is a vulnerability or security hole in a computer system unknown to its developers or anyone capable of mitigating it. Until the vulnerability is remedied...
    25 KB (3,047 words) - 08:00, 17 June 2025
  • Thumbnail for Meltdown (security vulnerability)
    also discovered Spectre. The security vulnerability was called Meltdown because "the vulnerability basically melts security boundaries which are normally...
    87 KB (8,241 words) - 14:35, 26 December 2024
  • Thumbnail for Spectre (security vulnerability)
    Intel responded to the reported security vulnerabilities with an official statement. AMD originally acknowledged vulnerability to one of the Spectre variants...
    83 KB (7,089 words) - 17:59, 16 June 2025
  • Training Platforms Vulnerability research The methods identified exploit known security vulnerabilities and attempt to evade security to gain entry into...
    18 KB (1,870 words) - 03:36, 6 June 2025
  • and various applications, where hidden vulnerabilities can compromise the integrity and security of computer systems. Exploits can cause unintended or...
    18 KB (1,951 words) - 11:04, 25 May 2025
  • Downfall, known as Gather Data Sampling (GDS) by Intel, is a computer security vulnerability found in 6th through 11th generations of consumer and 1st through...
    8 KB (570 words) - 12:20, 10 May 2025
  • Web site and Web domain hacking. Vulnerability scanner A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses...
    55 KB (5,962 words) - 03:26, 11 June 2025
  • Thumbnail for Computer security
    Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security...
    220 KB (22,314 words) - 10:38, 16 June 2025
  • acceptable See software security assurance. Computer security Hacking: The Art of Exploitation IT risk Threat (computer) Vulnerability (computing) Hardware...
    3 KB (283 words) - 14:52, 26 May 2025
  • In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system...
    39 KB (4,709 words) - 08:02, 17 June 2025
  • vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be confused with vulnerability assessment. Vulnerabilities...
    6 KB (573 words) - 11:38, 11 May 2025
  • SWAPGS, also known as Spectre variant 1, is a computer security vulnerability that utilizes the branch prediction used in modern microprocessors. Most...
    6 KB (581 words) - 03:53, 6 February 2025
  • In the field of computer security, independent researchers often discover flaws in software that can be abused to cause unintended behaviour; these flaws...
    15 KB (1,606 words) - 19:22, 22 May 2025
  • Spoiler is a security vulnerability on modern computer central processing units that use speculative execution. It exploits side-effects of speculative...
    3 KB (195 words) - 09:13, 15 August 2024
  • The Common Vulnerabilities and Exposures (CVE) system, originally Common Vulnerability Enumeration, provides a reference method for publicly known information-security...
    17 KB (2,102 words) - 00:33, 26 May 2025
  • Penetration test (category Computer network security)
    cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test...
    29 KB (3,516 words) - 21:18, 27 May 2025
  • Thumbnail for Computer worm
    relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new...
    24 KB (2,746 words) - 17:13, 16 June 2025
  • Thumbnail for Security
    information security management scheme. Computer security, IT security, ICT security, and network security are thus all subdomains of information security. National...
    25 KB (2,608 words) - 15:06, 11 June 2025
  • is a security vulnerability in systems that use Diffie–Hellman key exchange with the same prime number. It was discovered by a team of computer scientists...
    12 KB (1,297 words) - 06:30, 11 March 2025
  • A vulnerability database (VDB) is a platform aimed at collecting, maintaining, and disseminating information about discovered computer security vulnerabilities...
    17 KB (1,831 words) - 13:37, 4 November 2024
  • A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. These scanners are used to discover...
    5 KB (639 words) - 13:40, 24 May 2025
  • A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually...
    13 KB (1,505 words) - 20:01, 18 May 2025
  • Thumbnail for Security.txt
    security.txt is an accepted standard for website security information that allows security researchers to report security vulnerabilities easily. The...
    6 KB (546 words) - 21:16, 25 May 2025
  • patched against MDS and this vulnerability has the exact same mitigations, software vendors don't have to address this vulnerability. In October 2021 for the...
    71 KB (5,148 words) - 01:20, 12 June 2025
  • interconnected computer systems in most domains of life is the main factor that causes vulnerability to cyberattacks, since virtually all computer systems have...
    38 KB (4,669 words) - 09:20, 9 June 2025
  • EternalBlue (category Computer security exploits)
    EternalBlue is a computer exploit software developed by the U.S. National Security Agency (NSA). It is based on a zero-day vulnerability in Microsoft Windows...
    23 KB (1,902 words) - 16:20, 4 June 2025
  • cloud computing. It is a sub-domain of computer security, network security and, more broadly, information security. Cloud computing and storage provide...
    53 KB (6,671 words) - 06:52, 7 April 2025
  • Malware (redirect from Computer contaminant)
    interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan...
    76 KB (7,664 words) - 19:10, 18 June 2025