• Active Exploits is a diceless set of role-playing game rules by Precis Intermedia Gaming. The core rules (which contain no setting) are distributed for...
    5 KB (446 words) - 19:36, 30 December 2020
  • Thumbnail for The Exploited
    The Exploited are a Scottish punk rock band from Edinburgh, formed in 1978 by Stevie Ross and Terry Buchan, with Buchan soon replaced by his brother Wattie...
    37 KB (3,108 words) - 01:54, 3 June 2025
  • known about the true extent, use, benefit, and harm of zero-day exploits". Exploits based on zero-day vulnerabilities are considered more dangerous than...
    25 KB (3,046 words) - 22:37, 13 July 2025
  • series created by Steven Knight. Set in Birmingham, England, it follows the exploits of the Peaky Blinders crime gang in the direct aftermath of the First World...
    54 KB (254 words) - 02:38, 2 July 2025
  • HardNova 2, Ghostories, EarthAD.2, Two-Fisted Tales, Lord of Olympus, Active Exploits Diceless Roleplaying, Warcosm, and Brutes. Other notable products include...
    4 KB (297 words) - 10:01, 21 May 2025
  • Thumbnail for Dirty COW
    Dirty COW (category Privilege escalation exploits)
    kernel created before 2018. It is a local privilege escalation bug that exploits a race condition in the implementation of the copy-on-write mechanism in...
    8 KB (781 words) - 00:06, 12 March 2025
  • Log4Shell (category Injection exploits)
    half of all corporate networks globally have been actively probed, with over 60 variants of the exploit having been produced within 24 hours. Check Point...
    36 KB (3,505 words) - 23:44, 10 July 2025
  • Thumbnail for WebP
    implementing libwebp. Among these vulnerabilities, CVE-2023-4863 was an actively exploited vulnerability with a high risk rating of CVSS 8.8. This could lead...
    49 KB (4,396 words) - 05:41, 2 July 2025
  • Thumbnail for Orphan work
    rights remain unknown to the public even when those rights are being actively exploited by authors or other rightsholders. Precise figures of orphan works...
    20 KB (2,268 words) - 19:29, 21 May 2025
  • Thumbnail for Sandworm (hacker group)
    published a cybersecurity advisory warning that the Sandworm group was actively exploiting a remote code execution vulnerability (referred to as CVE-2019-10149)...
    26 KB (2,239 words) - 11:08, 22 April 2025
  • may prepare. The following day, informally known as "Exploit Wednesday", marks the time when exploits may appear in the wild which take advantage on unpatched...
    19 KB (1,947 words) - 06:25, 16 July 2025
  • Thumbnail for Diceless role-playing game
    although secret information does create uncertainty for players. Active Exploits, a diceless set of role-playing game rules by Precis Intermedia Gaming...
    5 KB (555 words) - 20:06, 5 November 2024
  • Thumbnail for Nat Love
    1921) was an American cowboy and writer active in the period following the Civil War. His reported exploits have made him one of the more famous heroes...
    11 KB (1,261 words) - 01:08, 9 June 2025
  • Thumbnail for 2020 United States federal government data breach
    suitable access to exploit the VMware bugs, it was not yet definitively known whether attackers had in fact chained those two exploits in the wild. On December...
    189 KB (13,647 words) - 15:22, 10 June 2025
  • television series created by Steven Knight. Set in Birmingham, it follows the exploits of the Peaky Blinders crime gang in the direct aftermath of the First World...
    50 KB (5,859 words) - 06:46, 13 July 2025
  • 2021 Microsoft Exchange Server data breach (category Computer security exploits)
    cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers...
    39 KB (3,582 words) - 12:54, 1 April 2025
  • Thumbnail for Sweden in Union with Norway
    wresting Norway from the united kingdoms of Denmark-Norway. Sweden actively exploited the opportunity, while Norway reluctantly resigned itself to submitting...
    31 KB (4,419 words) - 12:51, 24 June 2025
  • security tools and exploits at a very high pace. Some of its exploits only became known after leaking to the community. This included exploits for wu-ftp, apache...
    8 KB (633 words) - 20:35, 16 June 2025
  • concentration gradient. Active transport requires cellular energy to achieve this movement. There are two types of active transport: primary active transport that...
    32 KB (3,834 words) - 16:13, 16 July 2025
  • Thumbnail for WordPress
    Retrieved March 28, 2023. Cimpanu, Catalin (March 1, 2020). "Hackers are actively exploiting zero-days in several WordPress plugins". ZDNet. Retrieved July 7...
    87 KB (6,176 words) - 18:10, 12 July 2025
  • many embedded applications, and its known vulnerabilities have been actively exploited. Free and open-source software portal Comparison of web servers Network...
    3 KB (188 words) - 06:46, 21 February 2025
  • that Bkav's technique was more of a "proof-of-concept" rather than active exploitation risk, with the technique requiring a detailed measurement or digital...
    33 KB (3,612 words) - 21:02, 7 July 2025
  • Thumbnail for Active electronically scanned array
    An active electronically scanned array (AESA) is a type of phased array antenna, which is a computer-controlled antenna array in which the beam of radio...
    46 KB (5,369 words) - 18:55, 16 June 2025
  • Active learning is "a method of learning in which students are actively or experientially involved in the learning process and where there are different...
    49 KB (6,127 words) - 13:14, 7 July 2025
  • Thumbnail for BlueKeep
    BlueKeep (category Computer security exploits)
    activity and warned, based on histories of exploits from similar vulnerabilities, that an active exploit of the BlueKeep vulnerability in the wild might...
    22 KB (1,849 words) - 05:45, 13 May 2025
  • (September 25, 2019). "High-severity vulnerability in vBulletin is being actively exploited". Ars Technica. Retrieved 2019-11-30. "vBulletin 4.X Publishing Suite...
    6 KB (470 words) - 16:00, 15 July 2025
  • market for zero-day exploits is commercial activity related to the trafficking of software exploits. Software vulnerabilities and "exploits" are used to get...
    20 KB (2,883 words) - 19:02, 30 April 2025
  • Thumbnail for Penelope Boothby
    have lost and what we are afraid to lose.” The image of Penelope was actively exploited by popular culture throughout the 20th century. She was the daughter...
    5 KB (540 words) - 15:50, 6 March 2025
  • The Exploits Valley Salmon Festival is an annual festival held in Grand Falls-Windsor of the Exploits Valley, Newfoundland and Labrador, Canada that dates...
    9 KB (912 words) - 00:46, 13 July 2025
  • |newspaper= ignored (help) Tatum, Megan (28 November 2019). "Easy money and exploitation: should grocery brands explore multi-level marketing?". The Grocer. Retrieved...
    12 KB (971 words) - 01:52, 11 November 2024