SELECT ?property ?value WHERE { BIND (?? AS ?s) ?s ?property ?value . FILTER (isLiteral(?value)) } LIMIT 1000

Attributes

scanner de vulnérabilité
scanner di vulnerabilità
Schwachstellen-Scanner
vulnerability scanner
Network tool that scans network devices to identify generally known and organization specific common vulnerabilities and exposures.
Outil spécialisé qui permet d’identifier automatiquement les failles de sécurité en comparant les éléments du système informatique avec une base de données de vulnérabilités connues.
Software, die IT-Systeme, Netzwerke und Anwendungen automatisiert auf Schwachstellen und Sicherheitslücken untersucht.
Strumento che cerca, rileva e valuta continuamente le potenziali falle di sicurezza nei sistemi informatici, inclusi gli aggiornamenti di sicurezza mancanti, le configurazioni errate e i segreti esposti.
2025-11-25T10:13:02.4491660Z
525378
https://www.termdat.bk.admin.ch/entry/525378
DataScientist, Scan de vulnérabilité : Qu’est-ce que c’est ? ([Internet, 2025-11-25](https://datascientest.com/scan-de-vulnerabilite-tout-savoir))
IBM, Che cos'è la scansione delle vulnerabilità? ([Internet, 2025-11-25](https://www.ibm.com/it-it/think/topics/vulnerability-scanning))
NIST, vulnerability scanner ([Internet, 2025-11-25](https://csrc.nist.gov/glossary/term/vulnerability_scanner))
Security-Insider, Was ist ein Schwachstellen-Scanner? ([Internet, 2025-11-25](https://www.security-insider.de/was-ist-ein-schwachstellen-scanner-a-ebd491467cd958689c2de0dee749299e/))
EXP: Schwachstellen-Scanner verwenden im Hintergrund Datenbanken mit bereits bekannten Schwachstellen
nach Security-Insider, Was ist ein Schwachstellen-Scanner? ([Internet, 2025-11-25](https://www.security-insider.de/was-ist-ein-schwachstellen-scanner-a-ebd491467cd958689c2de0dee749299e/))
Security-Insider, Was ist ein Schwachstellen-Scanner? ([Internet, 2025-11-25](https://www.security-insider.de/was-ist-ein-schwachstellen-scanner-a-ebd491467cd958689c2de0dee749299e/))
after NIST, vulnerability scanner ([Internet, 2025-11-25](https://csrc.nist.gov/glossary/term/vulnerability_scanner))
d'après DataScientist, Scan de vulnérabilité : Qu’est-ce que c’est ? ([Internet, 2025-11-25](https://datascientest.com/scan-de-vulnerabilite-tout-savoir))
secondo Wiz, Che cos'è la scansione delle vulnerabilità? ([Internet, 2025-11-25](https://www.wiz.io/it-it/academy/vulnerability-scanning))
SELECT ?property ?object WHERE { BIND (?? AS ?s) ?s ?property ?object . FILTER (isIRI(?object)) FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
SELECT ?property ?subject WHERE { BIND (?? AS ?o) ?subject ?property ?o . FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
Incoming Relationships: No results found.
SELECT ?instance ?description WHERE { BIND (?? AS ?class) ?instance (rdf:type|owl:type) ?class . OPTIONAL { ?instance schema:description ?description . } } LIMIT 5000
Instances of this Class: No results found.
SELECT ?superclass ?description WHERE { ?? rdfs:subClassOf ?superclass . OPTIONAL { ?superclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Superclasses of this Class: No results found.
SELECT ?subclass ?description WHERE { ?subclass rdfs:subClassOf ?? . OPTIONAL { ?subclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Subclasses of this Class: No results found.