Vulnerability (computing)
In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerabilities are also known as the attack surface. Constructs in programming languages that are difficult to use properly can manifest large numbers of vulnerabilities.
industry
known for
product
service
Component VulnerabilityComputer security vulnerabilitiesComputer security vulnerabilityNetwork vulnerability scanSecurity HolesSecurity holeSecurity vulnerabilitiesSecurity vulnerabilitySoftware Security vulnerabilitySoftware Vulnerabilities.Software security vulnerabilitySoftware vulnerabilitiesSoftware vulnerabilityVulnVulnerability (computer science)Vulnerability (software)Vulnerability disclosureVulnerability researchVulnerability windowWeakness (computing)
Wikipage redirect
2016 Cyber Grand Challenge2016 Dyn cyberattack2018 in science2018 in technology and computing2019 in science2021 Microsoft Exchange Server data breach2021 in science26th Operational Weather SquadronAT&TATM SafetyPIN softwareAddress space layout randomizationAdministrative shareAdobe Flash PlayerAir gap (networking)AlterNICAmerican Innovation and Competitiveness ActAmerican fuzzy lop (fuzzer)Analog holeAndroid_(operating_system)Antisec MovementAntivirus softwareApache OpenOfficeApplication securityApril–June 2020 in scienceArbitrary code executionAri SchwartzAsset (computer security)Astrée (static analysis)Attack patternsAttack surfaceAttack treeAuthbindBackportingBlack Hat BriefingsBlended threatBlueBorne (security vulnerability)BlueKeepBranch predictorBredolab botnetBroker injection
Link from a Wikipage to another Wikipage
services
primaryTopic
Vulnerability (computing)
In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerabilities are also known as the attack surface. Constructs in programming languages that are difficult to use properly can manifest large numbers of vulnerabilities.
has abstract
Dans le domaine de la sécurité ...... ogicielle est appelée exploit.
@fr
Een beveiligingslek of kwetsba ...... ken waarmee hij dit lek sluit.
@nl
Em segurança de computadores, ...... ade será apresentada a seguir.
@pt
En seguretat informàtica, una ...... a servidors o bases de dades).
@ca
In computer security, a vulner ...... ge numbers of vulnerabilities.
@en
Inom datasäkerhet används term ...... jänster kan råka ut för detta.
@sv
Un agujero de seguridad o vuln ...... olar la seguridad del sistema.
@es
Una vulnerabilità informatica ...... confronti di hacker o cracker.
@it
Zranitelnost (anglicky vulnera ...... , počítačový virus a podobně).
@cs
В компьютерной безопасности те ...... зование обновленных версий ПО.
@ru
Link from a Wikipage to an external page
Wikipage page ID
page length (characters) of wiki page
Wikipage revision ID
1,026,099,221
Link from a Wikipage to another Wikipage
wikiPageUsesTemplate
subject
hypernym
comment
Dans le domaine de la sécurité ...... té des données qu'il contient.
@fr
Een beveiligingslek of kwetsba ...... et gevolg ervan wordt benoemd.
@nl
Em segurança de computadores, ...... que esteja rodando na máquina.
@pt
En seguretat informàtica, una ...... a servidors o bases de dades).
@ca
In computer security, a vulner ...... ge numbers of vulnerabilities.
@en
Inom datasäkerhet används term ...... att ta sig in i värdmaskinen.
@sv
Un agujero de seguridad o vuln ...... olar la seguridad del sistema.
@es
Una vulnerabilità informatica ...... sicurezza dell'intero sistema.
@it
Zranitelnost (anglicky vulnera ...... , počítačový virus a podobně).
@cs
В компьютерной безопасности те ...... я и имеют известные эксплойты.
@ru
label
Agujero de seguridad
@es
Beveiligingslek
@nl
Sicherheitslücke
@de
Säkerhetshål
@sv
Vulnerabilidade (computação)
@pt
Vulnerabilitat (informàtica)
@ca
Vulnerability (computing)
@en
Vulnerabilità informatica
@it
Vulnérabilité (informatique)
@fr
Zranitelnost
@cs