A vulnerability for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner
Source: Article 3(39) of Cyber Resilience Act (draft 2022)
« Back to Glossary IndexA vulnerability for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner
Source: Article 3(39) of Cyber Resilience Act (draft 2022)
« Back to Glossary IndexYou can follow any responses to this entry through the RSS 2.0 Both comments and pings are currently closed.