Research Article

Dynamic Threat Weight of Network Security Communication Based on Multisource Data Analysis

Table 6

A vulnerability database based on the vulnerability scanning information provided by the underlying module.

Vulnerability nameHostAs a result ofPopularityEaseHazard

Weak passwords for ordinary usersAObtain normal user permissions0.20.20.2
Newgrp buffer overflowAObtain root user rights0.90.80.867
SSH privilege escalationBGet admin rights0.90.90.9
MrYSQL default configurationCCan access and change the database0.90.90.93