Content deleted Content added
Fly Tags: Reverted Visual edit Mobile edit Mobile web edit |
m Reverted 1 edit by 2601:447:C783:FFD0:98AB:48DF:DECD:4620 (talk) to last revision by YourLocalZenith |
||
Line 33:
''By Method of Communication:''<ref name=":0">{{Cite web |date=2024-06-18 |title=What Is An Exploit? |url=https://www.ituonline.com/tech-definitions/what-is-an-exploit/ |access-date=2025-03-15 |language=en-US}}</ref>
* '''Remote Exploits''': Works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
* '''Local Exploits:''' Requires prior access or physical access to the vulnerable system, and usually increases the privileges of the person running the exploit past those granted by the system administrator.
|