Table 3.
Targets | Vulnerabilities/Instances | ||
---|---|---|---|
High | Medium | Low | |
Operating System | 1/1 | 3/3 | 2/2 |
Components | 12/18 | 5/8 | 4/7 |
Application | 10/13 | 4/4 | 5/8 |
Targets | Vulnerabilities/Instances | ||
---|---|---|---|
High | Medium | Low | |
Operating System | 1/1 | 3/3 | 2/2 |
Components | 12/18 | 5/8 | 4/7 |
Application | 10/13 | 4/4 | 5/8 |