Critical Vulnerability and Exposure Using the “CVE List Home,”
Assessment Description:
• Research a critical vulnerability and exposure using the “CVE List Home,” (use the link below for CVE List).
• Identify the CVE NUMBER AND PROVIDE A LINK TO THE WEBSITE.
• Assume your organization wishes the system to remain online and fully functional.
• Discuss in detail the SPECIFIC VULNERABILITY ASSOCIATED WITH YOUR CHOSEN LIST ITEM, PROVIDE A PLAUSIBLE THREAT, AND HOW YOU WOULD MITIGATE IT.