Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • action to secure the system. Vulnerability management typically is a combination of remediation (fixing the vulnerability), mitigation (increasing the...
    26 KB (3,287 words) - 23:03, 2 April 2025
  • a vulnerability or security hole in a computer system unknown to its owners, developers or anyone capable of mitigating it. Until the vulnerability is...
    24 KB (2,954 words) - 23:34, 23 March 2025
  • Thumbnail for IPCC Sixth Assessment Report
    following topics: The Physical Science Basis (WGI); Impacts, Adaptation and Vulnerability (WGII); Mitigation of Climate Change (WGIII). Of these, the first study...
    60 KB (6,145 words) - 06:12, 11 March 2025
  • Thumbnail for Narcissism
    entitlement, lack of empathy, and devaluation of others. Grandiosity and vulnerability are seen as different expressions of this antagonistic core, arising...
    56 KB (6,268 words) - 11:56, 6 April 2025
  • Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The...
    25 KB (3,188 words) - 20:42, 29 March 2025
  • Climate change vulnerability is a concept that describes how strongly people or ecosystems are likely to be affected by climate change. Its formal definition...
    56 KB (7,562 words) - 05:41, 19 March 2025
  • Thumbnail for Apple M1
    covert channel, violating the security model and constituting a minor vulnerability. It was discovered by Hector Martin, founder of the Asahi Linux project...
    34 KB (2,957 words) - 00:14, 8 April 2025
  • Thumbnail for Spectre (security vulnerability)
    Lipp, and Yuval Yarom. It was made public in conjunction with another vulnerability, Meltdown, on 3 January 2018, after the affected hardware vendors had...
    83 KB (7,081 words) - 23:07, 31 March 2025
  • POODLE (redirect from POODLE vulnerability)
    Encryption") is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they...
    14 KB (1,353 words) - 02:32, 12 March 2025
  • Thumbnail for Heartbleed
    heartbeat extension. Thus, the bug's name derived from heartbeat. The vulnerability was classified as a buffer over-read, a situation where more data can...
    118 KB (9,779 words) - 14:27, 10 March 2025
  • BlueBorne is a type of security vulnerability with Bluetooth implementations in Android, iOS, Linux and Windows. It affects many electronic devices such...
    9 KB (728 words) - 23:51, 15 March 2025
  • Thumbnail for Shellshock (software bug)
    developed a patch (fix) for the issue, which by then had been assigned the vulnerability identifier CVE-2014-6271. The existence of the bug was announced to...
    34 KB (3,343 words) - 05:06, 15 August 2024
  • Thumbnail for Meltdown (security vulnerability)
    Meltdown also discovered Spectre. The security vulnerability was called Meltdown because "the vulnerability basically melts security boundaries which are...
    87 KB (8,241 words) - 14:35, 26 December 2024
  • Thumbnail for BlueKeep
    BlueKeep (CVE-2019-0708) is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol (RDP) implementation, which allows for...
    22 KB (1,849 words) - 22:16, 15 June 2024
  • implications of universal dependency, vulnerability and justice. Her recent work formulates a theory of vulnerability. She is a progressive liberal thinker;...
    26 KB (2,651 words) - 12:05, 20 February 2025
  • Thumbnail for Foreshadow
    Foreshadow, known as L1 Terminal Fault (L1TF) by Intel, is a vulnerability that affects modern microprocessors that was first discovered by two independent...
    22 KB (1,943 words) - 13:13, 19 November 2024
  • Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative execution in...
    13 KB (869 words) - 01:53, 18 November 2024
  • Speculative multithreading Hardware security bug Transient execution CPU vulnerability Lampson, Butler (2006). "Lazy and Speculative Execution in Computer...
    8 KB (978 words) - 23:32, 1 December 2024
  • In its broadest sense, social vulnerability is one dimension of vulnerability to multiple stressors and shocks, including abuse, social exclusion and...
    44 KB (5,067 words) - 20:25, 10 April 2025
  • The ROCA vulnerability is a cryptographic weakness that allows the private key of a key pair to be recovered from the public key in keys generated by...
    10 KB (1,045 words) - 00:43, 17 March 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)