Display title | BlueBomb Wii |
Default sort key | BlueBomb Wii |
Page length (in bytes) | 3,354 |
Page ID | 18003 |
Page content language | en-gb - British English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of redirects to this page | 1 |
Counted as a content page | Yes |
Page image | |
Edit | Allow all users (infinite) |
Move | Allow all users (infinite) |
Page creator | HydeWing (talk | contribs) |
Date of page creation | 10:19, 14 Haziran 2022 |
Latest editor | HydeWing (talk | contribs) |
Date of latest edit | 02:53, 26 March 2023 |
Total number of edits | 10 |
Total number of distinct authors | 1 |
Recent number of edits (within past 90 days) | 0 |
Recent number of distinct authors | 0 |
Hidden category (1) | This page is a member of a hidden category:
|
Transcluded templates (3) | Templates used on this page:
|
Description | Content |
Article description: (description ) This attribute controls the content of the description and og:description elements. | BlueBomb is a known exploit that targets Broadcom's Bluetooth stack, which is utilized in the Nintendo Wii gaming console. It takes advantage of the Wii's Bluetooth and injects unsigned code into the system via Bluetooth. |