Research Article
A Software Vulnerability Rating Approach Based on the Vulnerability Database
Figure 4
Exploitability subscore curves from 2002 to 2012 for two vulnerability types; the exploitability of a vulnerability changes when increases over time.