en computer vulnerability

An English term in ConceptNet 5.8

Source: OpenCyc 2012
View this term in the API
  • Documentation
  • FAQ
  • Chat
  • Blog
  • Documentation
  • FAQ
  • Chat
  • Blog

Types of computer vulnerability

  • en access validation vulnerability (n) ➜
  • en bounce attack vulnerability (n) ➜
  • en decryption vulnerability (n) ➜
  • en denial of service vulnerability (n) ➜
  • en eavesdropping vulnerability (n) ➜
  • en faulty file replacement vulnerability (n) ➜
  • en improper input validation vulnerability (n) ➜
  • en insecure login vulnerability (n) ➜
  • en insecure mail storage vulnerability (n) ➜
  • en javascript command execution vulnerability (n) ➜
  • en locally exploitable computer vulnerability (n) ➜
  • en mail relay vulnerability (n) ➜
  • en no activity logging vulnerability (n) ➜
  • en php command execution vulnerability (n) ➜
  • en plaintext transmission vulnerability (n) ➜
  • en predictable cookie ids vulnerability (n) ➜
  • en program configuration vulnerability (n) ➜
  • en readable kernel memory vulnerability (n) ➜
  • en remotely exploitable computer vulnerability (n) ➜
  • en security software bypass vulnerability (n) ➜
  • More »

computer vulnerability is a type of…

  • en computer (n) ➜
  • en computer operation attack vulnerability (n) ➜

Links to other resources

  • umbel.org /umbel/sc/ComputerVulnerability
  • sw.opencyc.org /2012/05/10/concept/en/ComputerVulnerability
Creative Commons License
ConceptNet 5 is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. If you use it in research, please cite this AAAI paper.
See Copying and Sharing ConceptNet for more details.