Research Article
Dynamic Threat Weight of Network Security Communication Based on Multisource Data Analysis
Table 6
A vulnerability database based on the vulnerability scanning information provided by the underlying module.
| Vulnerability name | Host | As a result of | Popularity | Ease | Hazard |
| Weak passwords for ordinary users | A | Obtain normal user permissions | 0.2 | 0.2 | 0.2 | Newgrp buffer overflow | A | Obtain root user rights | 0.9 | 0.8 | 0.867 | SSH privilege escalation | B | Get admin rights | 0.9 | 0.9 | 0.9 | MrYSQL default configuration | C | Can access and change the database | 0.9 | 0.9 | 0.93 |
|
|