Research Article

A Software Vulnerability Rating Approach Based on the Vulnerability Database

Figure 3

Theoretical distributions of exploitability subscores for SVRA (a) and CVSS v2 (b), where and .
932397.fig.003a
(a)
932397.fig.003b
(b)