Exploit (computer security)W
Exploit (computer security)
Vulnerability (computing)W
Vulnerability (computing)
Arbitrary code executionW
Arbitrary code execution
Armitage (computing)W
Armitage (computing)
BlueKeepW
BlueKeep
Code injectionW
Code injection
Cross-site scriptingW
Cross-site scripting
Cryptojacking malwareW
Cryptojacking malware
Dangling pointerW
Dangling pointer
DirtyToothW
DirtyTooth
Drive-by downloadW
Drive-by download
DROWN attackW
DROWN attack
EFAILW
EFAIL
Tor (network)W
Tor (network)
Evil maid attackW
Evil maid attack
ForeshadowW
Foreshadow
HeartbleedW
Heartbleed
Idle scanW
Idle scan
Integer overflowW
Integer overflow
KRACKW
KRACK
Load value injectionW
Load value injection
MalwareW
Malware
Meltdown (security vulnerability)W
Meltdown (security vulnerability)
Metasploit ProjectW
Metasploit Project
Microarchitectural Data SamplingW
Microarchitectural Data Sampling
Payload (computing)W
Payload (computing)
Privilege escalationW
Privilege escalation
Race conditionW
Race condition
Reflected DOM InjectionW
Reflected DOM Injection
Ryuk (ransomware)W
Ryuk (ransomware)
ShellcodeW
Shellcode
Smudge attackW
Smudge attack
Spectre (security vulnerability)W
Spectre (security vulnerability)
SQL injectionW
SQL injection
Stagefright (bug)W
Stagefright (bug)
SwattingW
Swatting
Timeline of computer viruses and wormsW
Timeline of computer viruses and worms
Vault 7W
Vault 7
Computer virusW
Computer virus
WannaCry ransomware attackW
WannaCry ransomware attack
WarchalkingW
Warchalking
WardrivingW
Wardriving