Example diagram. Figure 14 shows the addition of a mitigation in the diagram. This mitigation addresses the vulnerability concerning input validation. Implementing the mitigation can therefore be expected to reduce the conditional likelihood of the leads-to relation to which the vulnerability is attached, although likelihood values are not shown in the diagram.
Appears in 1 contract
Sources: Grant Agreement
Example diagram. Figure 14 12 shows the addition of a mitigation in the diagram. This mitigation addresses the vulnerability concerning input validation. Implementing the mitigation can therefore be expected to reduce the conditional likelihood of the leads-to relation to which the vulnerability is attached, although likelihood values are not shown in the diagram.
Appears in 1 contract
Sources: Grant Agreement