Serious threats, such as those that affect default
installations of widely deployed software, result in
root compromise of servers, and the exploit code is
widely available to attackers. The attacker usually does
not need any special authentication credentials or
knowledge about the individual victims and the target
does not need to be manipulated into performing any
special functions.
|