漏洞利用 (Chinese Wikipedia)

Analysis of information sources in references of the Wikipedia article "漏洞利用" in Chinese language version.

refsWebsite
Global rank Chinese rank
1st place
1st place
low place
low place
low place
low place
193rd place
421st place
5th place
12th place
low place
low place
786th place
827th place
low place
8,457th place
2,882nd place
2,383rd place
low place
low place
low place
low place
low place
low place
low place
low place
1,266th place
1,781st place
2nd place
23rd place
low place
low place
187th place
481st place
low place
low place
7,043rd place
5,527th place
54th place
88th place
low place
low place
low place
low place

avast.com (Global: low place; Chinese: 8,457th place)

  • Latto, Nica. Exploits: What You Need to Know. Exploits: What You Need to Know. 2020-09-29 [2024-08-12]. (原始内容存档于2024-05-15). An exploit is any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware. Exploits usually take the form of software or code that aims to take control of computers or steal network data. 

cisco.com (Global: 2,882nd place; Chinese: 2,383rd place)

  • What Is an Exploit?. Cisco. 2023-10-06 [2024-08-12]. (原始内容存档于2024-05-31). An exploit is a program, or piece of code, designed to find and take advantage of a security flaw or vulnerability in an application or computer system, typically for malicious purposes such as installing malware. An exploit is not malware itself, but rather it is a method used by cybercriminals to deliver malware. 

citizenlab.ca (Global: low place; Chinese: low place)

cyberhoot.com (Global: low place; Chinese: low place)

digitalbond.com (Global: low place; Chinese: low place)

doi.org (Global: 2nd place; Chinese: 23rd place)

exploit-db.com (Global: low place; Chinese: low place)

forbes.com (Global: 54th place; Chinese: 88th place)

insurancejournal.com (Global: low place; Chinese: low place)

malwarebytes.com (Global: low place; Chinese: low place)

  • Exploit Definition. Malwarebytes. 2024-04-15 [2024-08-12]. (原始内容存档于2024-05-16). A computer exploit is a type of malware that takes advantage of bugs or vulnerabilities, which cybercriminals use to gain illicit access to a system. These vulnerabilities are hidden in the code of the operating system and its applications just waiting to be discovered and put to use by cybercriminals. Commonly exploited software includes the operating system itself, browsers, Microsoft Office, and third-party applications. 

mitre.org (Global: low place; Chinese: low place)

attack.mitre.org

  • Obtain Capabilities: Exploits, Sub-technique T1588.005. MITRE ATT&CK®. 2020-10-15 [2024-08-12]. (原始内容存档于2024-05-24). Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. 

nsa.gov (Global: 7,043rd place; Chinese: 5,527th place)

owasp.org (Global: low place; Chinese: low place)

  • OWASP Secure Coding Practices. OWASP Foundation. [2024-08-12]. (原始内容存档于2024-01-06). To take advantage of a vulnerability. Typically this is an intentional action designed to compromise the software's security controls by leveraging a vulnerability. 

portswigger.net (Global: low place; Chinese: low place)

python.engineering (Global: low place; Chinese: low place)

rapid7.com (Global: low place; Chinese: low place)

techcrunch.com (Global: 187th place; Chinese: 481st place)

social.techcrunch.com

umn.edu (Global: 1,266th place; Chinese: 1,781st place)

misq.umn.edu

web.archive.org (Global: 1st place; Chinese: 1st place)

wired.com (Global: 193rd place; Chinese: 421st place)

worldcat.org (Global: 5th place; Chinese: 12th place)

zdnet.com (Global: 786th place; Chinese: 827th place)