This does impact “Confidentiality” of the system running the vulnerable software.
2020-06-18 19:43:01 Author: medium.com(查看原文) 阅读量:131 收藏

Harsh Bothra

Jun 18 · 1 min read

This does impact the “Confidentiality” of the system running the vulnerable software. Assume a scenario where an attacker is having initial foothold to the target system, the information harvested from any source (not just limited to this one) can be utilized to perform targeted attacks.


文章来源: https://medium.com/@hbothra22/this-does-impact-confidentiality-of-the-system-running-the-vulnerable-software-6f2c1ff21a17?source=rss-54fa249211d2------2
如有侵权请联系:admin#unsafe.sh