Review Article

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Table 1

Vulnerabilities on each server.

ServerVulnerabilitiesCVE ID

WSAllow remote execution of codeCVE-2015-1635

DBSRemote execution of SQL commandCVE-2014-1466

FSAllow remote execution of codeCVE-2013-4465
Allow remote execution of codeCVE-2012-2526

ASAllow remote execution of codeCVE-2009-0241