Overview#
Exploit are when Attackers take advantage of a Vulnerability (by way of an Attack) to cause an Unfortunate eventAny software that has a vulnerability as described within a Exploit should be corrected.
More Information#
There might be more information for this subject on one of the following:- Advanced Persistent Threat
- Anonymous Cipher Suite
- Attack Effort
- Attacker
- BEAST
- BREACH (security exploit)
- Biometric Sensor
- Breach
- CRIME
- CSRF Token
- Common Vulnerabilities and Exposures
- Complex Event Processing
- Credential Leakage
- Cross-site request forgery
- Cross-site scripting
- Cryptographically Weak
- DNS cache poisoning
- Denial-of-Service
- Derive the Master Secret
- Distributed Denial-of-Service
- FREAK
- Heartbleed
- How To Crack SSL-TLS
- Information Leakage
- Kerberos Forged Ticket
- Logjam
- Lucky 13
- NIST.SP.800-63C
- OAuth 2.0 Vulnerabilities
- Pass-the-hash
- Password Authentication is Broken
- Phishing
- Phone Number Portability
- Poodle
- Public Key Infrastructure
- Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
- Replay attack
- SHA-1 Deprecation
- SSL-TLS Interception
- Same-site Cookies
- Side-channel attacks
- Sybil
- TLS Compression
- Transport Layer Security
- Vulnerability