Terms
Alphabetical index of published term entries with tag filters and quick sort.
- Updated Jan 05, 2026
reflects the complexity of the attack required to exploit the software feature misuse vulnerability.
- TERMAccess VectorUpdated Jan 05, 2026
reflects the access required to exploit the vulnerability.
- TERMactive attackUpdated Jan 06, 2026
An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man in the middle (MitM), impersonation, and session hijacking.
- Updated Jan 03, 2026
Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks, including conducting Reconnaissance, creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT AI)