- Attack Vector - The vulnerability access vector is the network. In other words, the attacker can be anywhere and remotely exploit the vulnerability. 不用侷限一定要在本機端,操作攻擊。
- Attack Complexity - The complexity of the vulnerability is low – so less-skilled attackers can take advantage of it, and “repeatable success” can be expected.
- Privileges Required - No privileges (authentication) are required, simplifying the attack and (again) enlarging the number of potential adversaries.
沒有留言:
張貼留言