Jump to content

Wikipedia:WikiProject Computer Security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2024-08-01 to 2024-08-31

Total views: 5,527,202

Updated: 21:41, 5 September 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 337,782 10,896 C High
2 TamilRockers 137,431 4,433 Start Low
3 Darktrace 99,232 3,201 Start Low
4 Facebook malware 83,736 2,701 Start Mid
5 Pegasus (spyware) 82,917 2,674 B Low
6 Anonymous (hacker group) 73,952 2,385 GA Mid
7 CrowdStrike 72,569 2,340 B Mid
8 Blockchain 61,977 1,999 B Top
9 Phishing 60,358 1,947 B High
10 Indian WhatsApp lynchings 50,028 1,613 List High
11 Proxy server 49,481 1,596 B High
12 Reality Winner 48,529 1,565 B Mid
13 Virtual private network 45,920 1,481 C Mid
14 Roman Seleznev 45,439 1,465 Start Low
15 List of Tor onion services 40,029 1,291 List Low
16 Russian interference in the 2016 United States elections 39,997 1,290 B High
17 Kevin Mitnick 39,790 1,283 C High
18 Lolita City 38,533 1,243 Start Low
19 WarGames 37,902 1,222 C Low
20 ILOVEYOU 37,591 1,212 C Mid
21 Secure Shell 36,140 1,165 C Low
22 Google hacking 32,550 1,050 Start Low
23 Software testing 31,717 1,023 C Low
24 Cloudflare 31,708 1,022 C Low
25 Cybercrime 28,035 904 C High
26 Self-driving car 27,926 900 B Mid
27 Hackers (film) 26,998 870 C Low
28 Malware 25,588 825 C Top
29 Man-in-the-middle attack 25,586 825 C Mid
30 Zero-day vulnerability 24,650 795 C High
31 DJI 24,620 794 C Low
32 Swatting 24,531 791 C Mid
33 Facebook–Cambridge Analytica data scandal 24,500 790 C High
34 Keychain (software) 24,323 784 Start Low
35 Playpen (website) 24,103 777 Start Low
36 Vault 7 24,080 776 C Unknown
37 BIOS 22,718 732 B Mid
38 Palo Alto Networks 22,344 720 C High
39 Kali Linux 21,745 701 Start Mid
40 End-to-end encryption 21,592 696 C Mid
41 Single sign-on 21,193 683 C High
42 Cryptographic hash function 21,098 680 C High
43 Pretty Good Privacy 21,018 678 B High
44 Ashley Madison data breach 20,880 673 Start Mid
45 OAuth 19,894 641 C Mid
46 Cross-site request forgery 19,386 625 C High
47 List of data breaches 19,175 618 List High
48 Time-based one-time password 18,965 611 C High
49 Ransomware 18,891 609 GA High
50 Mail and wire fraud 18,882 609 Start Mid
51 Adobe Flash 18,746 604 C Low
52 Trusted Platform Module 18,578 599 C High
53 Certificate authority 17,690 570 C High
54 Security hacker 17,618 568 C Top
55 Cross-site scripting 17,535 565 B High
56 Information security 17,440 562 B Top
57 Privacy 17,437 562 C High
58 Lazarus Group 16,852 543 C Mid
59 Trojan horse (computing) 16,597 535 C High
60 2014 Sony Pictures hack 16,488 531 C High
61 SQL injection 16,467 531 Start High
62 Social engineering (security) 16,164 521 C High
63 Federal Information Processing Standards 15,975 515 Start Low
64 Synopsys 15,592 502 B Mid
65 Reverse engineering 15,566 502 C High
66 Moxie Marlinspike 15,341 494 B Low
67 Phone hacking 15,251 491 Start Mid
68 Kerberos (protocol) 15,054 485 C High
69 Risk 14,828 478 C Top
70 Zip bomb 14,516 468 Start Low
71 Kids Online Safety Act 14,242 459 B Low
72 ReCAPTCHA 14,085 454 B Mid
73 Data breach 13,899 448 GA Mid
74 SIM swap scam 13,788 444 Start Mid
75 VirusTotal 13,745 443 Start High
76 NSO Group 13,687 441 B Mid
77 Wiz (company) 13,516 436 Start Low
78 Payment Card Industry Data Security Standard 13,466 434 Start Low
79 Public key infrastructure 13,322 429 Start High
80 Honeypot (computing) 13,265 427 Start High
81 Aladdin (BlackRock) 13,222 426 Stub Low
82 Zscaler 13,212 426 Start Low
83 Have I Been Pwned? 13,159 424 Start High
84 Electronic voting in India 12,875 415 GA High
85 Race condition 12,861 414 C Mid
86 System Management Mode 12,765 411 Start High
87 Operation Trojan Shield 12,739 410 C Low
88 Startpage.com 12,724 410 C Low
89 Sneakers (1992 film) 12,663 408 B Low
90 Human–computer interaction 12,647 407 C Low
91 Electronic voting 12,496 403 C Unknown
92 STRIDE model 12,380 399 Start Low
93 Zero trust security model 12,328 397 C High
94 White hat (computer security) 12,153 392 Start Low
95 Tails (operating system) 12,032 388 Start Mid
96 Protection ring 11,907 384 B High
97 Phreaking 11,629 375 C Mid
98 Authentication 11,581 373 C High
99 ID.me 11,564 373 Start Low
100 Bangladesh Bank robbery 11,557 372 C Low
101 EICAR test file 11,294 364 C Low
102 Script kiddie 11,200 361 Start Mid
103 Searx 11,191 361 C Unknown
104 Brute-force attack 11,151 359 C High
105 Fortinet 11,012 355 GA Mid
106 Spyware 10,816 348 B High
107 Common Vulnerabilities and Exposures 10,815 348 C Top
108 Okta, Inc. 10,661 343 Start Mid
109 Intel Management Engine 10,612 342 C High
110 Penetration test 10,381 334 C Mid
111 Microsoft Defender Antivirus 10,317 332 C Mid
112 OpenBSD 10,264 331 B High
113 News International phone hacking scandal 10,239 330 C Mid
114 Gary McKinnon 10,093 325 C High
115 List of the most common passwords 10,077 325 List Unknown
116 The Tor Project 10,060 324 C Top
117 Email spoofing 10,031 323 Start Mid
118 DMZ (computing) 9,944 320 Start High
119 Fancy Bear 9,859 318 C High
120 Advanced persistent threat 9,823 316 B High
121 Children's Online Privacy Protection Act 9,762 314 Start Low
122 Red team 9,759 314 GA Low
123 Wi-Fi Protected Setup 9,688 312 C Mid
124 Role-based access control 9,600 309 C Mid
125 Right to privacy 9,522 307 C High
126 Trellix 9,339 301 B Mid
127 Dmitri Alperovitch 9,331 301 C Low
128 Dynamic-link library 9,313 300 C Unknown
129 Timeline of computer viruses and worms 9,256 298 Start High
130 Cyberwarfare 9,222 297 C High
131 2016 Democratic National Committee email leak 9,062 292 C Mid
132 Identity management 8,999 290 C High
133 Morris worm 8,882 286 C High
134 RADIUS 8,827 284 C Mid
135 List of security hacking incidents 8,821 284 List High
136 Timeline of events associated with Anonymous 8,730 281 C Low
137 Botnet 8,699 280 C High
138 Electronic Frontier Foundation 8,474 273 C High
139 Black hat (computer security) 8,453 272 C Mid
140 Integer overflow 8,453 272 Start Unknown
141 Password cracking 8,419 271 C High
142 Hardware security module 8,387 270 Start Mid
143 VeraCrypt 8,357 269 C High
144 Security-Enhanced Linux 8,348 269 C High
145 Nmap 8,304 267 C Mid
146 Same-origin policy 8,172 263 Start High
147 Access control 8,100 261 Start High
148 Common Vulnerability Scoring System 8,046 259 C High
149 ChaCha20-Poly1305 7,976 257 C Low
150 United States Cyber Command 7,971 257 B High
151 SentinelOne 7,946 256 Start Unknown
152 Bitwarden 7,945 256 C Mid
153 Scammer Payback 7,943 256 Start Mid
154 CCleaner 7,891 254 C High
155 Pwnie Awards 7,881 254 C Low
156 Malwarebytes (software) 7,727 249 C Mid
157 Avast 7,657 247 B Mid
158 OpenID 7,644 246 B Low
159 YubiKey 7,602 245 Start Low
160 LulzSec 7,466 240 B High
161 Sudo 7,421 239 B Low
162 Software cracking 7,418 239 Start Mid
163 Web cache 7,379 238 Start Low
164 Intrusion detection system 7,362 237 Start High
165 List of warez groups 7,358 237 Start Mid
166 Hacktivism 7,345 236 C High
167 Fake news website 7,319 236 C Low
168 SiegedSec 7,315 235 C Low
169 Jay Chaudhry 7,313 235 Stub Low
170 Keystroke logging 7,255 234 C Low
171 OWASP 7,204 232 C Low
172 Maia arson crimew 7,182 231 GA Low
173 File-system permissions 7,166 231 C High
174 SAML 2.0 7,092 228 C Low
175 Log4Shell 7,049 227 C Mid
176 Certified information systems security professional 6,908 222 C Mid
177 Access-control list 6,843 220 Start High
178 Microsoft Intune 6,831 220 Start Mid
179 Weev 6,818 219 C Low
180 Paywall 6,812 219 C Mid
181 Cyberspace 6,811 219 C High
182 Business continuity planning 6,804 219 B Mid
183 Password manager 6,793 219 C Mid
184 Kill switch 6,771 218 C Low
185 Lightning Network 6,686 215 Start Low
186 Backdoor (computing) 6,682 215 C Mid
187 Patch Tuesday 6,652 214 C Mid
188 Buffer overflow 6,631 213 B High
189 Low Orbit Ion Cannon 6,588 212 Start Low
190 Metasploit 6,587 212 C Mid
191 Podesta emails 6,562 211 C Low
192 Norton AntiVirus 6,498 209 C Mid
193 KeePass 6,490 209 C Mid
194 SpyEye 6,462 208 Stub Unknown
195 Burp Suite 6,432 207 Stub Low
196 List of hacker groups 6,406 206 Start Mid
197 Jim Browning (YouTuber) 6,373 205 Start Low
198 Certified ethical hacker 6,300 203 Start Low
199 Avast Antivirus 6,250 201 Start Mid
200 Credential stuffing 6,248 201 C High
201 1Password 6,243 201 C Low
202 Address space layout randomization 6,196 199 C High
203 Dahua Technology 6,161 198 B Low
204 Sophos 6,129 197 Start Mid
205 Aubrey Cottle 6,125 197 C Mid
206 Van Eck phreaking 6,121 197 C Low
207 Security through obscurity 6,112 197 C Mid
208 Internet leak 6,024 194 C High
209 NTLM 6,003 193 C Mid
210 Personal identification number 5,974 192 C High
211 LockBit 5,968 192 C High
212 Brain (computer virus) 5,895 190 C Low
213 Tiny Banker Trojan 5,860 189 C Low
214 Iptables 5,845 188 Start Mid
215 Object-capability model 5,838 188 Start Mid
216 Jonathan James 5,776 186 Start Low
217 Null character 5,773 186 Start Mid
218 Adrian Lamo 5,713 184 C High
219 2011 PlayStation Network outage 5,632 181 C Mid
220 Samsung Knox 5,618 181 Start Mid
221 CyberArk 5,614 181 C Low
222 Lapsus$ 5,596 180 C Low
223 Hybrid warfare 5,585 180 C High
224 Let's Encrypt 5,582 180 B Low
225 Sony BMG copy protection rootkit scandal 5,524 178 B Low
226 Mutual authentication 5,456 176 Stub Low
227 Chinese wall 5,445 175 C Low
228 Technical support scam 5,430 175 GA Mid
229 Cult of the Dead Cow 5,400 174 C Mid
230 Port scanner 5,283 170 B High
231 Jeremy Hammond 5,272 170 C Low
232 Bug bounty program 5,235 168 C High
233 Obfuscation (software) 5,221 168 C Mid
234 Conti (ransomware) 5,205 167 Start Low
235 Petya (malware family) 5,188 167 C High
236 KeePassXC 5,077 163 Start Low
237 Root certificate 5,070 163 Start Mid
238 ESET 5,043 162 Start Low
239 Attribute-based access control 5,038 162 C Mid
240 List of cyberattacks 5,029 162 List High
241 Clickjacking 5,026 162 B Mid
242 Lattice-based cryptography 5,018 161 Start Low
243 Yahoo data breaches 5,015 161 GA Mid
244 Trishneet Arora 4,994 161 Start Low
245 NIST Cybersecurity Framework 4,966 160 Start Top
246 Network security 4,964 160 Start High
247 Automatic Certificate Management Environment 4,964 160 Start Low
248 Collision avoidance system 4,941 159 C Mid
249 CalyxOS 4,933 159 C Low
250 IDN homograph attack 4,912 158 C Mid
251 Off-by-one error 4,876 157 Start Unknown
252 Jeff Moss (hacker) 4,876 157 Stub Low
253 BlackCat (cyber gang) 4,872 157 Start Low
254 Marcus Hutchins 4,862 156 C Mid
255 Office of Personnel Management data breach 4,858 156 C High
256 Voice phishing 4,834 155 Stub Mid
257 DNS sinkhole 4,834 155 Start Unknown
258 ActionScript 4,828 155 C Low
259 Operation Olympic Games 4,827 155 Start Mid
260 Ungoogled-chromium 4,814 155 Start Low
261 Cyber Resilience Act 4,749 153 C Low
262 AVG AntiVirus 4,737 152 Start Low
263 LastPass 4,722 152 Start Low
264 Mydoom 4,702 151 Start Mid
265 Voter-verified paper audit trail 4,691 151 C High
266 ClamAV 4,650 150 Start Unknown
267 List of cybercriminals 4,619 149 List Mid
268 Whitelist 4,617 148 Start Low
269 Tiger team 4,615 148 Start Unknown
270 Fork (blockchain) 4,608 148 Start Low
271 Return-oriented programming 4,538 146 C High
272 Cozy Bear 4,528 146 C Mid
273 Billion laughs attack 4,450 143 Start Low
274 Operation Aurora 4,428 142 C Mid
275 John the Ripper 4,416 142 Start Low
276 Digital forensics 4,392 141 GA High
277 Web of trust 4,362 140 C Low
278 Code Red (computer worm) 4,318 139 Start Low
279 Intel Active Management Technology 4,215 135 C High
280 Netfilter 4,212 135 C Mid
281 Reception and criticism of WhatsApp security and privacy features 4,202 135 C Low
282 2024 Change Healthcare ransomware attack 4,166 134 Start Low
283 Wickr 4,150 133 C Mid
284 Four Horsemen of the Infocalypse 4,147 133 Start Low
285 Fake news websites in the United States 4,128 133 B High
286 Chaos Computer Club 4,104 132 C Mid
287 Content Security Policy 4,095 132 C High
288 Keeper (password manager) 4,095 132 Start Low
289 Threat model 4,057 130 Start Low
290 Endpoint detection and response 4,039 130 Start Low
291 Row hammer 4,037 130 GA Low
292 Bread Financial 4,032 130 Start Low
293 Hector Monsegur 4,004 129 Stub Low
294 Albert Gonzalez 3,979 128 C Mid
295 Time-of-check to time-of-use 3,948 127 Start Low
296 Creeper and Reaper 3,917 126 Start Low
297 Mirror site 3,915 126 Start Mid
298 Replay attack 3,898 125 C High
299 Offensive Security 3,884 125 C Low
300 Security token 3,879 125 C High
301 2600: The Hacker Quarterly 3,877 125 Start Mid
302 Ron Rivest 3,866 124 Start High
303 Cold boot attack 3,820 123 C Low
304 Code injection 3,793 122 C High
305 Third-party cookies 3,761 121 C Low
306 Offensive Security Certified Professional 3,737 120 Start Mid
307 Nintendo data leak 3,699 119 C Low
308 Proofpoint, Inc. 3,696 119 Start Low
309 Pegasus Project (investigation) 3,658 118 C Low
310 The Cuckoo's Egg (book) 3,644 117 Start Low
311 Mitigation 3,638 117 Start Mid
312 Physical security 3,619 116 C Top
313 Evaluation Assurance Level 3,616 116 Start Low
314 Electronic voting by country 3,565 115 C Unknown
315 CryptoLocker 3,561 114 C Mid
316 Privacy law 3,535 114 Start High
317 Bruce Schneier 3,531 113 Start High
318 Daniel J. Bernstein 3,509 113 C Mid
319 Endpoint security 3,493 112 Stub Unknown
320 Kevin Poulsen 3,459 111 Start Mid
321 Rhysida (hacker group) 3,447 111 Start Low
322 ISACA 3,437 110 Start Low
323 Vendor 3,409 109 Start Low
324 CIH (computer virus) 3,367 108 Start Low
325 Open banking 3,363 108 C Low
326 The Artifice Girl 3,358 108 Start Low
327 Conficker 3,305 106 B Mid
328 ISC2 3,302 106 Start Mid
329 Google Safe Browsing 3,293 106 Start Unknown
330 Briar (software) 3,283 105 Start Low
331 Nessus (software) 3,265 105 Start Low
332 Arbitrary code execution 3,263 105 C High
333 Melissa (computer virus) 3,254 104 Start Unknown
334 AACS encryption key controversy 3,226 104 GA Low
335 Len Sassaman 3,225 104 C Low
336 Evil maid attack 3,208 103 C Mid
337 Chaos Communication Congress 3,204 103 Start Low
338 2017 Ukraine ransomware attacks 3,199 103 C High
339 OneTrust 3,187 102 C Low
340 Common Criteria 3,186 102 Start Low
341 Pseudonymization 3,144 101 Start Unknown
342 Internet security 3,142 101 C High
343 DarkSide (hacker group) 3,131 101 Start Low
344 Non-repudiation 3,109 100 Start Mid
345 Blaster (computer worm) 3,103 100 Start Low
346 Shellshock (software bug) 3,096 99 C High
347 COBIT 3,077 99 Start High
348 Information security standards 3,072 99 C Top
349 DNS spoofing 3,067 98 Start Mid
350 Bell–LaPadula model 3,065 98 C Low
351 YTCracker 3,053 98 Start Unknown
352 Hack Forums 3,037 97 C Low
353 Zero Days 3,021 97 Start Low
354 Comparison of instant messaging protocols 3,010 97 List Low
355 Cellebrite UFED 3,009 97 C Low
356 Ankit Fadia 2,991 96 Start Low
357 Jennifer Arcuri 2,990 96 C Low
358 Memory safety 2,961 95 C Low
359 Timing attack 2,955 95 C Mid
360 Diameter (protocol) 2,953 95 Start Low
361 Entrust 2,936 94 Start Unknown
362 Comparison of computer viruses 2,929 94 List High
363 List of password managers 2,923 94 List Low
364 BeyondTrust 2,914 94 Stub Low
365 Avira 2,912 93 C Low
366 Flame (malware) 2,897 93 C Mid
367 DREAD (risk assessment model) 2,890 93 Start Low
368 Data security 2,885 93 Start High
369 Dictionary attack 2,876 92 C High
370 Mandatory access control 2,862 92 C High
371 Computer forensics 2,852 92 C High
372 DarkMatter Group 2,847 91 C Low
373 Secure by design 2,846 91 Start High
374 Goatse Security 2,846 91 Start Low
375 Acceptable use policy 2,830 91 Start Mid
376 Dangling pointer 2,826 91 C Mid
377 Peiter Zatko 2,825 91 B Mid
378 Tsutomu Shimomura 2,824 91 Start Unknown
379 MAC spoofing 2,808 90 Start Unknown
380 Sandworm (hacker group) 2,807 90 Stub High
381 Contingency plan 2,789 89 Start High
382 Kaspersky and the Russian government 2,782 89 C High
383 Authentication, authorization, and accounting 2,780 89 Start Mid
384 Climatic Research Unit email controversy 2,727 87 B Low
385 Cyber kill chain 2,726 87 Stub Unknown
386 Kill chain (military) 2,723 87 Start Unknown
387 Dan Kaminsky 2,702 87 B Mid
388 Phrack 2,678 86 C Mid
389 Chief information security officer 2,677 86 Start Mid
390 Forcepoint 2,675 86 Start Unknown
391 Certificate Transparency 2,652 85 C High
392 Hacker Manifesto 2,649 85 Start Mid
393 Darik's Boot and Nuke 2,637 85 Start Unknown
394 Coordinated vulnerability disclosure 2,622 84 Stub High
395 Cyberwarfare by Russia 2,599 83 Start Mid
396 List of computer security certifications 2,593 83 List Mid
397 Symantec Endpoint Protection 2,583 83 GA Low
398 Application security 2,569 82 Start High
399 EC-Council 2,567 82 Start Mid
400 Fail2ban 2,554 82 Start Mid
401 Tanium 2,550 82 Start Low
402 SANS Institute 2,547 82 Start Mid
403 Snort (software) 2,529 81 Start Mid
404 Hacker ethic 2,517 81 C High
405 Wardialing 2,511 81 Start Unknown
406 Drive-by download 2,511 81 Start High
407 Cyber-security regulation 2,502 80 C High
408 Federated identity 2,500 80 Start High
409 Radia Perlman 2,498 80 C Mid
410 The Crash (2017 film) 2,492 80 Start Low
411 Capability-based security 2,491 80 Start High
412 PLA Unit 61398 2,487 80 Start Mid
413 File inclusion vulnerability 2,457 79 Start Mid
414 VMware Carbon Black 2,451 79 Start Unknown
415 Chain of trust 2,446 78 Start Mid
416 Hashcat 2,438 78 C Low
417 Java KeyStore 2,435 78 Stub Low
418 Buffer overflow protection 2,431 78 C Mid
419 New generation warfare 2,429 78 Start Low
420 EPrivacy Directive 2,413 77 C Low
421 Communications security 2,393 77 Start Mid
422 Russian interference in the 2020 United States elections 2,390 77 B Low
423 Electronic voting in the United States 2,376 76 B Mid
424 Data retention 2,366 76 C Low
425 Computer and network surveillance 2,365 76 C Top
426 Cyberwarfare by China 2,355 75 C High
427 Guccifer 2.0 2,346 75 B Low
428 Cyber spying 2,339 75 Start High
429 Jacob Appelbaum 2,335 75 B Low
430 Magic Lantern (spyware) 2,330 75 Stub Unknown
431 Shellcode 2,326 75 B High
432 Hardening (computing) 2,315 74 Start Mid
433 Anna Kournikova (computer virus) 2,312 74 C Mid
434 Trust on first use 2,294 74 Start Low
435 Security-focused operating system 2,271 73 List Mid
436 Nulled 2,268 73 Start Unknown
437 Blue Coat Systems 2,259 72 C Low
438 2007 cyberattacks on Estonia 2,256 72 Start High
439 Confused deputy problem 2,237 72 Start High
440 Xbox Underground 2,237 72 C Low
441 DDoS attacks on Dyn 2,232 72 C Mid
442 Whiz Kids (TV series) 2,216 71 C Low
443 Email hacking 2,211 71 Start Mid
444 FIPS 140 2,208 71 Start Low
445 Computer emergency response team 2,207 71 Start High
446 Security operations center 2,195 70 Start Low
447 Information sensitivity 2,192 70 Start Low
448 ATT&CK 2,191 70 Stub Low
449 Click fraud 2,175 70 C Low
450 List of cyber warfare forces 2,171 70 Start Low
451 Secureworks 2,140 69 Start Unknown
452 Trusted timestamping 2,136 68 Start Unknown
453 Cybersecurity Maturity Model Certification 2,135 68 C Low
454 Shoulder surfing (computer security) 2,128 68 C Low
455 Blacklist (computing) 2,108 68 Start Mid
456 Mobile security 2,098 67 C Top
457 Self-XSS 2,093 67 Start Low
458 360 Safeguard 2,080 67 Start Low
459 2015 Ukraine power grid hack 2,080 67 C Mid
460 FIPS 140-3 2,073 66 C Low
461 Mermaids (charity) 2,072 66 Start Low
462 Ping of death 2,071 66 Start Low
463 Secure cookie 2,065 66 Start High
464 Cain and Abel (software) 2,060 66 Start Low
465 British Library cyberattack 2,055 66 Start Low
466 United States Army Cyber Command 2,054 66 Stub Low
467 Cloud computing security 2,050 66 Start Unknown
468 Encrypting File System 2,042 65 B Mid
469 Dark0de 2,037 65 Start Mid
470 CYREN 2,034 65 B Mid
471 GhostNet 2,010 64 C Mid
472 Data loss prevention software 2,001 64 Start Mid
473 L0pht 1,996 64 B Mid
474 Fortify Software 1,996 64 Start Unknown
475 Webroot 1,990 64 Start Low
476 SAML metadata 1,982 63 C Low
477 Quick Heal 1,980 63 Start Mid
478 Brian Krebs 1,975 63 Start Low
479 Discretionary access control 1,973 63 Start Mid
480 Information assurance 1,973 63 B High
481 Opportunistic TLS 1,968 63 Start Mid
482 HackingTeam 1,961 63 B Mid
483 Shamoon 1,952 62 Start Mid
484 BREACH 1,931 62 Start High
485 ISO/IEC 27002 1,930 62 Stub Low
486 BleachBit 1,924 62 C Low
487 Next-generation firewall 1,913 61 Start Low
488 Rogue security software 1,910 61 C High
489 Threat actor 1,905 61 C Mid
490 Dynamic application security testing 1,903 61 Start Low
491 SQL Slammer 1,877 60 Start Low
492 Potentially unwanted program 1,873 60 C Mid
493 Orbot 1,867 60 Stub Low
494 Attack surface 1,863 60 Stub Mid
495 Market for zero-day exploits 1,849 59 C High
496 Comparison of TLS implementations 1,840 59 List High
497 Crypto++ 1,835 59 C Low
498 Iranian interference in the 2024 United States elections 1,802 58 Stub Mid
499 Common Weakness Enumeration 1,791 57 Start Low
500 Protected Extensible Authentication Protocol 1,767 57 C Low