Browse vulnerabilities by how they're exploited, or dive into the most affected vendors.
Exploitable remotely over the internet with no physical access required. The most dangerous and common attack vector.
Requires access to the same local network, Bluetooth, or subnet as the target system.
Requires local system access — the attacker must be logged in or have physical presence.
Requires direct physical interaction with the target device to exploit the vulnerability.