Privileges required to exploit a vulnerability

​A vulnerability may require specific permission of being exploited. For example logging in to a system is required to exploit a vulnerability. It doesn’t mean that such a vulnerability will not need to be fixed, it just means that one more step is required to use it.

Comments

Popular posts from this blog

Absolute and relative path in HTML pages

Errors

goto PHP operator