CaLiGraph
Formats
RDF
N-Triples
N3/Turtle
JSON
XML
CSV
OData
Atom
JSON
Microdata
JSON
HTML
Embedded
JSON
Turtle
Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
LODmilla Browser
Sparql Endpoint
About:
clgo:
Computer_security_exploit
Property
Value
rdf:
type
owl:
Class
rdfs:
label
Computer security exploit
rdfs:
subClassOf
owl:
Thing
prov:
wasDerivedFrom
http://en.wikipedia.org/wiki/Category:Computer_security_exploits
is
rdf:
type
of
Null character
2021 Microsoft Exchange Server data breach
Voice phishing
Cyber Insider Threat
Improper input validation
Cross-application scripting
Memory safety
Mimikatz
Integer overflow
Copy attack
DNS spoofing
Exploit (computer security)
SMBRelay
Shatter attack
Misfortune Cookie (computers)
Row hammer
Warchalking
Hyperjacking
Stack buffer overflow
Market for zero-day exploits
Return-to-libc attack
Symlink race
Phillip Porras
Time-of-check to time-of-use
Dynamic linker
Register spring
Silver Sparrow (malware)
Virus hoax
Blind return oriented programming
Racetrack problem
Dangling pointer
Evil maid attack
2014 Russian hacker password theft
Blended threat
Virtual machine escape
SigSpoof
Webattacker
EFAIL
Server-side request forgery
Cybersecurity Capacity Maturity Model for Nations
Covert channel
KRACK
Heap overflow
Weird machine
Smudge attack
Pass the hash
Predictable serial number attack
Project 25
WannaCry ransomware attack
Coordinated vulnerability disclosure
Relay attack
Threat (computer)
DoublePulsar
WooYun
Vulnerability database
Buffer over-read
Port scanner
Stagefright (bug)
Drive-by download
BlueKeep
Lorcon
Sigreturn-oriented programming
EternalBlue
Heap spraying
Simjacker
Hertzbleed
Memory corruption
Zeroday Emergency Response Team
SIGRed
WAP billing
Wardriving
In-session phishing
Meltdown (security vulnerability)
Threat model
Buffer overflow
Ripple20
NOP slide
Warshipping
Race condition
Ryuk (ransomware)
VENOM
Zerodium
Pharming
Kr00k
Network Investigative Technique
Swatting
Exploit kit
JIT spraying
Heartbleed
2012 LinkedIn hack
Heap feng shui
Clear channel assessment attack
Windows Metafile vulnerability
HTTP parameter pollution
Ivanti Pulse Connect Secure data breach
KARMA attack
Return-oriented programming
Vulnerability management
Vault 7
Common Vulnerabilities and Exposures
... and more
is
rdfs:
subClassOf
of
Web security exploit
Injection exploit