2018年1月6日 星期六

Vulnerability Criticality

  • Attack Vector - The vulnerability access vector is the network. In other words, the attacker can be anywhere and remotely exploit the vulnerability. 不用侷限一定要在本機端,操作攻擊。

  • Attack Complexity - The complexity of the vulnerability is low – so less-skilled attackers can take advantage of it, and “repeatable success” can be expected.

  • Privileges Required - No privileges (authentication) are required, simplifying the attack and (again) enlarging the number of potential adversaries. 

沒有留言:

張貼留言