Content deleted Content added
m Dating maintenance tags: {{Clarify}} |
Clarify that physical access is one of the possibility |
||
Line 11:
A ''remote exploit'' works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
A ''local exploit'' requires
Exploits against client applications may also require some interaction with the user and thus may be used in combination with the [[social engineering (security)|social engineering]] method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples.
|