First page Back Continue Last page Overview Graphics
Exploits
Often requires more than one vulnerability to fully compromise a device
They often require user action to follow a link or visit a particular web page.
Particular device models can be targeted due to various monocultures (ISPs for example)