Research Article
Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems
Table 1
List of vulnerabilities in the test network.
| Host | Vulnerability | Score | Type |
| BP | Remote buffer overflow | 0.16 | r2r | CP | Remote buffer overflow | 0.16 | r2r | OM | Acquire privileges by providing an arbitrary program name as a command-line argument | 0.39 | l2r | MTP | Acquire privileges by providing an arbitrary program name as a command-line argument | 0.39 | l2r | PMS | Remote buffer overflow | 0.16 | r2r |
|
|