Confirmed users
180
edits
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| border="1" class="fullwidth-table sortable" | {| border="1" class="fullwidth-table sortable" | ||
|Likelihood||Probability||Technical| | |Likelihood||Probability||Technical|| | ||
|- | |- | ||
|1||Shouldn't happen||Advanced Attack with requirement of multiple vulnerabilities to exploit| | |1||Shouldn't happen||Advanced Attack with requirement of multiple vulnerabilities to exploit|| | ||
|- | |- | ||
|2||Once every few years||Advanced Attack| | |2||Once every few years||Advanced Attack|| | ||
|- | |- | ||
|3||Once a year||Moderate difficulty attack vector| | |3||Once a year||Moderate difficulty attack vector|| | ||
|- | |- | ||
|4||Multiple times a year||Common attack vector, requires manual exploit creation| | |4||Multiple times a year||Common attack vector, requires manual exploit creation|| | ||
|- | |- | ||
|5||Ongoing issue||Common attack vector, easy to mount with available tools| | |5||Ongoing issue||Common attack vector, easy to mount with available tools|| | ||
| | |||
|} | |} |