Alternative names (26)
CVE • CVE ID • CVE-ID • CWE-ID • areVulnerableTo • can be vulnerable to • canBeVulnerableTo • containsVulnerabilities • cveID • hasVulnerability • hasVulnerabilityType • is susceptible to • isVulnerableTo • notVulnerableTo • notableVulnerability • proneTo • susceptible to • susceptibleTo • vulnerabilities • vulnerability • vulnerability type • vulnerabilityCVE • vulnerabilityType • vulnerable to • vulnerableComponent • vulnerableIf • moreRandom triples
| Subject | Object |
|---|---|
| gptkb:IP_Telephony | Latency |
| gptkb:ECDSA_(for_Taproot_outputs) | malleability attacks |
| gptkb:DROWN_attack | gptkb:CVE-2016-0800 |
| gptkb:CVE-2021-36958 | gptkb:CVE-2021-36958 |
| gptkb:Watery_Blowhog | gptkb:fire |
| gptkb:Stagefright | CVE-2015-1538 |
| gptkb:Border_Gateway_Protocol | route leaks |
| gptkb:Taiwan_Power_Grid | typhoons |
| gptkb:X-Agent | gptkb:CVE-2017-0263 |
| gptkb:X-Agent | gptkb:CVE-2017-0262 |
| gptkb:scanf | format string attack |
| gptkb:Stagefright | CVE-2015-3929 |
| gptkb:IDEA_cipher | Linear cryptanalysis |
| gptkb:Stagefright | CVE-2015-3895 |
| gptkb:Cisco_IOS_Software | CVE-2017-6737 |
| gptkb:Microsoft_Security_Bulletin_MS17-028 | CVE-2017-0132 |
| gptkb:ECC_(Elliptic_Curve_Cryptography) | quantum computers |
| gptkb:MD5 | collision attacks |
| gptkb:Batman_(Hellbat_Suit) | overuse drains Batman's life force |
| gptkb:Astropaths | daemonic possession |