Security and Communication Networks / 2019 / Article / Tab 1

Review Article

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Table 1

Vulnerabilities on each server.

ServerVulnerabilitiesCVE ID

WSAllow remote execution of codeCVE-2015-1635

DBSRemote execution of SQL commandCVE-2014-1466

FSAllow remote execution of codeCVE-2013-4465
Allow remote execution of codeCVE-2012-2526

ASAllow remote execution of codeCVE-2009-0241

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19.