Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Computer security exploits
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
22272764
(xsd:integer)
dbo:
wikiPageRevisionID
1088447818
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Commons_category
dbt
:See_also
dbt
:CatAutoTOC
dbt
:Cat_main
dbt
:Category_diffuse
rdf:
type
skos
:Concept
rdfs:
label
Computer security exploits
(en)
skos:
broader
dbc
:Engineering_failures
dbc
:Cybercrime
dbc
:Cyberwarfare
dbc
:Computer_security
dbc
:Technology_hazards
skos:
prefLabel
Computer security exploits
(en)
skos:
related
dbc
:Computer_security
prov:
wasDerivedFrom
wikipedia-en
:Category:Computer_security_exploits?oldid=1088447818&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Cable_Haunt
dbr
:PrintNightmare
dbr
:Row_hammer
dbr
:Open_Bug_Bounty
dbr
:Project_25
dbr
:Blind_return_oriented_programming
dbr
:BlueKeep
dbr
:Pharming
dbr
:Return-oriented_programming
dbr
:Cyber_Insider_Threat
dbr
:Cybersecurity_Capacity_Maturity_Model_for_Nations
dbr
:DNS_leak
dbr
:DNS_spoofing
dbr
:Uncontrolled_format_string
dbr
:Vault_7
dbr
:Default_password
dbr
:DoublePulsar
dbr
:Dynamic_linker
dbr
:EFAIL
dbr
:Integer_overflow
dbr
:Intrusion_detection_system_evasion_techniques
dbr
:Ivanti_Pulse_Connect_Secure_data_breach
dbr
:JIT_spraying
dbr
:Null_session
dbr
:Predictable_serial_number_attack
dbr
:Weird_machine
dbr
:Time-of-check_to_time-of-use
dbr
:Zero-click_attack
dbr
:Meltdown_(security_vulnerability)
dbr
:Memory_corruption
dbr
:Network_Investigative_Technique
dbr
:System_Reconfiguration_Attacks
dbr
:Vulnerability_database
dbr
:Misfortune_Cookie_(computers)
dbr
:Coordinated_vulnerability_disclosure
dbr
:Copy_attack
dbr
:Cross-application_scripting
dbr
:Dangling_pointer
dbr
:Mimikatz
dbr
:Operation:_Bot_Roast
dbr
:Vulnerability_management
dbr
:2012_LinkedIn_hack
dbr
:Cache_poisoning
dbr
:SigSpoof
dbr
:Stagefright_(bug)
dbr
:Clear_channel_assessment_attack
dbr
:Common_Vulnerabilities_and_Exposures
dbr
:Computer_virus
dbr
:Zeroday_Emergency_Response_Team
dbr
:Zerodium
dbr
:Hardware_security_bug
dbr
:Kr00k
dbr
:Pass_the_hash
dbr
:Payload_(computing)
dbr
:SMS_spoofing
dbr
:Market_for_zero-day_exploits
dbr
:Voice_phishing
dbr
:WannaCry_ransomware_attack
dbr
:Drive-by_download
dbr
:HTTP_parameter_pollution
dbr
:Heap_feng_shui
dbr
:Heap_overflow
dbr
:Heap_spraying
dbr
:Laptop_theft
dbr
:Login_spoofing
dbr
:2021_Microsoft_Exchange_Server_data_breach
dbr
:FragAttacks
dbr
:Null_character
dbr
:DirtyTooth
dbr
:FluBot
dbr
:KARMA_attack
dbr
:Ramsay_Malware
dbr
:2014_Russian_hacker_password_theft
dbr
:Heartbleed
dbr
:Hertzbleed
dbr
:BadUSB
dbr
:Covert_channel
dbr
:Hyperjacking
dbr
:TRESOR
dbr
:Armitage_(computing)
dbr
:Account_pre-hijacking
dbr
:KRACK
dbr
:Blended_threat
dbr
:Swatting
dbr
:TCP_reset_attack
dbr
:EgotisticalGiraffe
dbr
:Threat_(computer)
dbr
:Mixed_threat_attack
dbr
:Reflection_attack
dbr
:Relay_attack
dbr
:WAP_billing
dbr
:Buffer_over-read
dbr
:Buffer_overflow
dbr
:Buffer_overflow_protection
dbr
:Warshipping
dbr
:Idle_scan
dbr
:Off-by-one_error
dbr
:Race_condition
dbr
:Lorcon
dbr
:Memory_safety
dbr
:Ryuk_(ransomware)
dbr
:Server-side_request_forgery
dbr
:Port_scanner
dbr
:Shatter_attack
dbr
:Smudge_attack
dbr
:VENOM
dbr
:Virtual_machine_escape
dbr
:Warchalking
dbr
:Wardriving
dbr
:Source_code_virus
dbr
:Virus_hoax
dbr
:Symlink_race
dbr
:EternalBlue
dbr
:Exploit_(computer_security)
dbr
:Exploit_kit
dbr
:Improper_input_validation
dbr
:In-session_phishing
dbr
:Register_spring
dbr
:Racetrack_problem
dbr
:Stack_buffer_overflow
dbr
:Windows_Metafile_vulnerability
dbr
:Evasion_(network_security)
dbr
:Evil_maid_attack
dbr
:NOP_slide
dbr
:Threat_model
dbr
:Phillip_Porras
dbr
:Sigreturn-oriented_programming
dbr
:Silver_Sparrow_(malware)
dbr
:Simjacker
dbr
:Wardialing
dbr
:Return-to-libc_attack
dbr
:SMBRelay
dbr
:SIGRed
dbr
:Webattacker
dbr
:Ripple20
dbr
:Structural_vulnerability_(computing)
dbr
:WooYun
is
dcterms:
subject
of
dbr
:Cable_Haunt
dbr
:PrintNightmare
dbr
:Row_hammer
dbr
:Open_Bug_Bounty
dbr
:Project_25
dbr
:Blind_return_oriented_programming
dbr
:BlueKeep
dbr
:Pharming
dbr
:Return-oriented_programming
dbr
:Cyber_Insider_Threat
dbr
:Cybersecurity_Capacity_Maturity_Model_for_Nations
dbr
:DNS_leak
dbr
:DNS_spoofing
dbr
:Uncontrolled_format_string
dbr
:Vault_7
dbr
:Default_password
dbr
:DoublePulsar
dbr
:Dynamic_linker
dbr
:EFAIL
dbr
:Integer_overflow
dbr
:Intrusion_detection_system_evasion_techniques
dbr
:Ivanti_Pulse_Connect_Secure_data_breach
dbr
:JIT_spraying
dbr
:Null_session
dbr
:Predictable_serial_number_attack
dbr
:Weird_machine
dbr
:Time-of-check_to_time-of-use
dbr
:Zero-click_attack
dbr
:Meltdown_(security_vulnerability)
dbr
:Memory_corruption
dbr
:Network_Investigative_Technique
dbr
:System_Reconfiguration_Attacks
dbr
:Vulnerability_database
dbr
:Misfortune_Cookie_(computers)
dbr
:Coordinated_vulnerability_disclosure
dbr
:Copy_attack
dbr
:Cross-application_scripting
dbr
:Dangling_pointer
dbr
:Mimikatz
dbr
:Operation:_Bot_Roast
dbr
:Vulnerability_management
dbr
:2012_LinkedIn_hack
dbr
:Cache_poisoning
dbr
:SigSpoof
dbr
:Stagefright_(bug)
dbr
:Clear_channel_assessment_attack
dbr
:Common_Vulnerabilities_and_Exposures
dbr
:Computer_virus
dbr
:Zeroday_Emergency_Response_Team
dbr
:Zerodium
dbr
:Hardware_security_bug
dbr
:Kr00k
dbr
:Pass_the_hash
dbr
:Payload_(computing)
dbr
:SMS_spoofing
dbr
:Market_for_zero-day_exploits
dbr
:Voice_phishing
dbr
:WannaCry_ransomware_attack
dbr
:Drive-by_download
dbr
:HTTP_parameter_pollution
dbr
:Heap_feng_shui
dbr
:Heap_overflow
dbr
:Heap_spraying
dbr
:Laptop_theft
dbr
:Login_spoofing
dbr
:2021_Microsoft_Exchange_Server_data_breach
dbr
:FragAttacks
dbr
:Null_character
dbr
:DirtyTooth
dbr
:FluBot
dbr
:KARMA_attack
dbr
:Ramsay_Malware
dbr
:2014_Russian_hacker_password_theft
dbr
:Heartbleed
dbr
:Hertzbleed
dbr
:BadUSB
dbr
:Covert_channel
dbr
:Hyperjacking
dbr
:TRESOR
dbr
:Armitage_(computing)
dbr
:Account_pre-hijacking
dbr
:KRACK
dbr
:Blended_threat
dbr
:Swatting
dbr
:TCP_reset_attack
dbr
:EgotisticalGiraffe
dbr
:Threat_(computer)
dbr
:Mixed_threat_attack
dbr
:Reflection_attack
dbr
:Relay_attack
dbr
:WAP_billing
dbr
:Buffer_over-read
dbr
:Buffer_overflow
dbr
:Buffer_overflow_protection
dbr
:Warshipping
dbr
:Idle_scan
dbr
:Off-by-one_error
dbr
:Race_condition
dbr
:Lorcon
dbr
:Memory_safety
dbr
:Ryuk_(ransomware)
dbr
:Server-side_request_forgery
dbr
:Port_scanner
dbr
:Shatter_attack
dbr
:Smudge_attack
dbr
:VENOM
dbr
:Virtual_machine_escape
dbr
:Warchalking
dbr
:Wardriving
dbr
:Source_code_virus
dbr
:Virus_hoax
dbr
:Symlink_race
dbr
:EternalBlue
dbr
:Exploit_(computer_security)
dbr
:Exploit_kit
dbr
:Improper_input_validation
dbr
:In-session_phishing
dbr
:Register_spring
dbr
:Racetrack_problem
dbr
:Stack_buffer_overflow
dbr
:Windows_Metafile_vulnerability
dbr
:Evasion_(network_security)
dbr
:Evil_maid_attack
dbr
:NOP_slide
dbr
:Threat_model
dbr
:Phillip_Porras
dbr
:Sigreturn-oriented_programming
dbr
:Silver_Sparrow_(malware)
dbr
:Simjacker
dbr
:Wardialing
dbr
:Return-to-libc_attack
dbr
:SMBRelay
dbr
:SIGRed
dbr
:Webattacker
dbr
:Ripple20
dbr
:Structural_vulnerability_(computing)
dbr
:WooYun
is
skos:
broader
of
dbc
:Malware
dbc
:Injection_exploits
dbc
:Redirects_from_Common_Vulnerabilities_and_Exposures
dbc
:Cryptographic_attacks
dbc
:Privilege_escalation_exploits
dbc
:Speculative_execution_security_vulnerabilities
dbc
:Web_security_exploits
dbc
:Denial-of-service_attacks
dbc
:Web_shells
is
skos:
related
of
dbc
:Cryptographic_attacks
dbc
:Computer_security
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License