Content deleted Content added
Tags: Mobile edit Mobile web edit Advanced mobile edit |
Fly Tags: Reverted Visual edit Mobile edit Mobile web edit |
||
Line 33:
''By Method of Communication:''<ref name=":0">{{Cite web |date=2024-06-18 |title=What Is An Exploit? |url=https://www.ituonline.com/tech-definitions/what-is-an-exploit/ |access-date=2025-03-15 |language=en-US}}</ref>
* '''Remote Exploits''': Works over a network and exploits the security vulnerability without any prior access
* '''Local Exploits:''' Requires prior access or physical access to the vulnerable system, and usually increases the privileges of the person running the exploit past those granted by the system administrator.
|