Privileges required to exploit a vulnerability
A vulnerability may require specific permission of being exploited. For example logging in to a system is required to exploit a vulnerability. It doesn’t mean that such a vulnerability will not need to be fixed, it just means that one more step is required to use it.
Comments
Post a Comment