Overview#
Exploit are when Attackers take advantage of a Vulnerability (by way of an Attack) to cause an Unfortunate event
Any software that has a vulnerability as described within an Exploit should be corrected.
Exploits may be used to gain Unauthorized Access
More Information#
There might be more information for this subject on one of the following:- Advanced Persistent Threat
- Anonymous Cipher Suite
- Attack Orchestrator
- Attacker
- Authoritative Entity
- BEAST
- BREACH (security exploit)
- Biometric Sensor
- Breach
- Buffer overflow
- CRIME
- CSRF Token
- Common Vulnerabilities and Exposures
- Common Vulnerability Scoring System
- Complex Event Processing
- Credential Leakage
- Cross-site request forgery
- Cross-site scripting
- Cryptographically Weak
- Data Leakage
- Denial-of-Service
- Derive the Master Secret
- Direct Anonymous Attestation
- Distributed Denial-of-Service
- Exploitation
- FALLOUT
- FREAK
- HAMMERSTEIN
- Heartbleed
- How To Crack SSL-TLS
- Kerberos Forged Ticket
- Key Reinstallation AttaCKs
- Logjam
- Lucky 13
- NIST.SP.800-63C
- OAuth 2.0 Vulnerabilities
- Pass-the-hash
- Password Authentication is Broken
- Phishing
- Phone Number Portability
- Poodle
- Public Key Infrastructure
- Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
- Replay attack
- Rowhammer
- SHA-1 Deprecation
- SQL Injection
- SSL-TLS Interception
- STORMBREW
- Same-site Cookies
- Side-channel attacks
- Spam
- Sybil
- TLS Compression
- Threat
- Transport Layer Security
- Vulnerability
- Zero-day