WExploit (computer security)
WVulnerability (computing)
WArbitrary code execution
WArmitage (computing)
WBlueKeep
WCode injection
WCross-site scripting
WCryptojacking malware
WDangling pointer
WDirtyTooth
WDrive-by download
WDROWN attack
WEFAIL
WTor (network)
WEvil maid attack
WForeshadow
WHeartbleed
WIdle scan
WInteger overflow
WKRACK
WLoad value injection
WMalware
WMeltdown (security vulnerability)
WMetasploit Project
WMicroarchitectural Data Sampling
WPayload (computing)
WPrivilege escalation
WRace condition
WReflected DOM Injection
WRyuk (ransomware)
WShellcode
WSmudge attack
WSpectre (security vulnerability)
WSQL injection
WStagefright (bug)
WSwatting
WTimeline of computer viruses and worms
WVault 7
WComputer virus
WWannaCry ransomware attack
WWarchalking
WWardriving