security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system. Security bugs...
3 KB (283 words) - 14:30, 3 July 2025
receive recognition and compensation for reporting bugs, especially those pertaining to security vulnerabilities. If no financial reward is offered,...
27 KB (2,985 words) - 20:17, 30 July 2025
"Another day, another Intel CPU security hole: Lazy State – Intel has announced that there's yet another CPU security bug in its Core-based microprocessors"...
83 KB (7,089 words) - 20:46, 25 July 2025
subsystem which was discovered to have a major security vulnerability in 2017 Pentium F00F bug Pentium FDIV bug Row hammer – an unintended side effect in dynamic...
87 KB (8,241 words) - 14:35, 26 December 2024
Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock...
34 KB (3,343 words) - 05:06, 15 August 2024
Heartbleed (redirect from Heartbleed Bug)
a security bug in some outdated versions of the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS)...
118 KB (9,768 words) - 01:15, 1 August 2025
The H Security: News and Features". h-online.com. "Java SE Development Kit 7 Update 40 Bug Fixes". oracle.com. "Oracle JDK 7u40 released – security features...
205 KB (11,285 words) - 20:43, 21 July 2025
A software bug is a design defect (bug) in computer software. A computer program with many or serious bugs may be described as buggy. The effects of a...
40 KB (4,704 words) - 06:34, 18 July 2025
In digital computing, hardware security bugs are hardware bugs or flaws that create vulnerabilities affecting computer central processing units (CPUs)...
3 KB (295 words) - 20:51, 30 September 2022
Linus's law (redirect from Given enough eyeballs, all bugs are shallow)
repeatedly shown the effectiveness of reviewing processes in finding bugs and security issues. In Facts and Fallacies about Software Engineering, Robert...
7 KB (757 words) - 22:13, 25 May 2025
compromise its security. Despite a system administrator's best efforts to achieve complete correctness, virtually all hardware and software contain bugs where...
27 KB (3,333 words) - 03:19, 9 June 2025
List of Firefox features (section Security)
Firefox code. Additionally, Mozilla has a security bug bounty system - anyone who reports a valid critical security bug receives a $3000 (US) cash reward for...
41 KB (4,499 words) - 15:58, 1 May 2025
execution Slipstream (computer science) Speculative multithreading Hardware security bug Transient execution CPU vulnerability Lampson, Butler (2006). "Lazy and...
8 KB (978 words) - 11:44, 25 May 2025
Core Infrastructure Initiative (section Heartbleed bug)
was announced on 24 April 2014 in the wake of Heartbleed, a critical security bug in OpenSSL that is used on millions of websites. OpenSSL is among the...
16 KB (1,310 words) - 15:41, 5 July 2024
typically exploited the security bug CVE-2015-2291, a cybersecurity issue in Windows' anti-DoS software, to terminate security software, allowing the group...
17 KB (1,649 words) - 04:50, 12 July 2025
RegreSSHion (category Software bugs)
RegreSSHion is a family of security bugs in the OpenSSH software that allows for an attacker to remotely execute code and gain potential root access on...
6 KB (444 words) - 21:04, 8 August 2024
finding a bug in an open-source software program (open-source bounty). For instance, the Mozilla Foundation offers bounties for security bug hunting. Bounty-driven...
23 KB (3,030 words) - 00:54, 25 May 2025
and "T2" models initially had a security bug that allowed anyone within 30 feet to make a clone of the key. The security firm NinjaLab has been able to...
5 KB (447 words) - 00:06, 7 July 2025
Mozilla Application Suite (section Security)
the Mozilla Foundation operated[when?] a "bug bounty" scheme: Users who reported a valid critical security bug received a US$500 cash reward for each report...
17 KB (2,154 words) - 06:36, 14 February 2025
Hacker (category Hacking (computer security))
term has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access...
41 KB (4,311 words) - 01:11, 24 June 2025
ISeeYou (category Software bugs)
iSeeYou is a security bug affecting iSight cameras in some Apple laptops. The researchers' decision to study webcam indicator lights resulted from the...
6 KB (536 words) - 06:36, 17 November 2024
Forward secrecy (category Transport Layer Security)
when its long-term secret keys are compromised, as with the Heartbleed security bug. If forward secrecy is used, encrypted communications and sessions recorded...
26 KB (3,047 words) - 17:57, 17 July 2025
denial-of-service attack, such as a fork bomb, and thus resource leaks present a security bug. Resource leaks are generally due to programming errors: resources that...
4 KB (474 words) - 21:27, 20 August 2024
developer of musl, stated that this bug reveals a major "system development design flaw". In 2017 another security bug was discovered in systemd-resolved...
85 KB (6,347 words) - 18:30, 24 July 2025
Badlock (category Software bugs)
Badlock (CVE-2016-2118) is a security bug disclosed on April 12, 2016 affecting the Security Account Manager (SAM) and Local Security Authority (Domain Policy)...
2 KB (132 words) - 19:37, 12 February 2024
Point of sale (section Security)
to $1. The security issues were reported to the vendor, and a patch was released soon after the notification. Oracle confirmed security bug affects over...
60 KB (8,086 words) - 16:23, 10 July 2025
liability is the issue of product liability for software bugs that cause harm, such as security bugs or bugs causing medical errors. For the most part, this liability...
2 KB (206 words) - 13:07, 29 June 2024
Memory safety (category Software bugs)
Memory safety is the state of being protected from various software bugs and security vulnerabilities when dealing with memory access, such as buffer overflows...
18 KB (1,911 words) - 12:35, 18 June 2025
Bash (Unix shell) (section Bug reporting)
recommended to use sudo on a per-command basis instead. In September 2014, a security bug was discovered in the program. It was dubbed "Shellshock." Public disclosure...
102 KB (7,788 words) - 16:35, 3 August 2025