A vulnerability is a weakness that can be exploited.
Links to this note
- CVE-2016-5195
- CVE-2021-40449
- authentication bypass
- CVE-2019-11539
- CVE-2020-8218
- CVE-2023-46805
- CVE-2024-21887
- CVE-2024-21888
- CVE-2024-22024
- CVE-2025-59287
- PwnKit
- CVE-2017-9805
- CVE-2022-0847
- miraisourceleaked-krebs2016
- china-linked hackers target Linux systems-antoniuk2024
- Malvuln Project
- selinuxsystemadministration_vermeulen2020
- command execution
- 0-day
- shellcode
- Software Exploits
- binary analysis
- buffer overflow
- Bug Bounty
- CVE
- CVE-2021-21974
- CVE-2021-44228
- default insecure
- exploits and 0-day as attribution
- heap overflow
- heartbleed
- memory corruption
- penetration testing
- regreSSHion
- software patching
- SQL injection
- threat research
- vanilla reverse shell
- vulnerability scanner
- vulnerability scanning