Research Article

A Software Vulnerability Rating Approach Based on the Vulnerability Database

Figure 4

Exploitability subscore curves from 2002 to 2012 for two vulnerability types; the exploitability of a vulnerability changes when increases over time.
932397.fig.004