Category:Computer security exploits
![]() | Pages in this category should be moved to subcategories where applicable. This category may require frequent maintenance to avoid becoming too large. It should directly contain very few, if any, pages and should mainly contain subcategories. |
This category contains articles related to computer security vulnerabilities and their exploits.
An exploit (from the same word in the French language, meaning "achievement", or "accomplishment") is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.
Subcategories
This category has the following 9 subcategories, out of 9 total.
Pages in category "Computer security exploits"
The following 155 pages are in this category, out of 155 total. This list may not reflect recent changes.
0–9
B
C
D
G
H
I
M
P
R
S
- Server-side request forgery
- Shatter attack
- Shellshock (software bug)
- SIGRed
- Sigreturn-oriented programming
- SigSpoof
- Silver Sparrow (malware)
- Simjacker
- Sinkclose
- SMBRelay
- SMS spoofing
- Smudge attack
- Stack buffer overflow
- Stagefright (bug)
- Structural vulnerability (computing)
- Swatting
- Symlink race
- System reconfiguration attacks