Penetration Test

Local Host Vulnerabilities

CVE(Common Vulnerabilities and Exposures) Database

https://www.cvedetails.com/vendor.php

Windows 10

image-20201029202054169

Apple

image-20201029202301733

Linux Kernel

image-20201029202446544

Android

image-20201029202623075

QUICK REVIEW
  • Every operating system has its own specific vulnerabilities
  • Online vulnerability repositories make it easy to determine which vulnerabilities apply to a specific target.
相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
原文地址:https://www.cnblogs.com/keepmoving1113/p/13899046.html