Research Article
A Software Vulnerability Rating Approach Based on the Vulnerability Database
Table 4
Theoretical exploitability score comparison.
| AV | AC | AU | Counta | | (v2) |
| Local | High | Multiple | 4 | 1.1 | 0 | Local | High | Single | 30 | 1.8 | 1.5 | Local | High | None | 437 | 3.6 | 1.9 | Local | Medium | Multiple | 2 | 0.9 | 0 | Local | Medium | Single | 83 | 2.3 | 2.7 | Local | Medium | None | 1122 | 4.5 | 3.4 | Local | Low | Multiple | 2 | 0.9 | 0 | Local | Low | Single | 193 | 2.9 | 3.1 | Local | Low | None | 5268 | 6.6 | 3.9 | Adj.Net. | High | Multiple | 1 | 0.8 | 0 | Adj.Net. | High | Single | 4 | 1.1 | 2.5 | Adj.Net. | High | None | 22 | 1.7 | 3.2 | Adj.Net. | Medium | Multiple | 0 | 0 | 0 | Adj.Net. | Medium | Single | 19 | 1.6 | 4.4 | Adj.Net. | Medium | None | 66 | 2.2 | 5.5 | Adj.Net. | Low | Multiple | 1 | 0.8 | 0 | Adj.Net. | Low | Single | 21 | 1.7 | 5.1 | Adj.Net. | Low | None | 124 | 2.6 | 6.5 | Network | High | Multiple | 7 | 1.3 | 0 | Network | High | Single | 213 | 3.0 | 3.9 | Network | High | None | 1884 | 5.1 | 4.9 | Network | Medium | Multiple | 5 | 1.2 | 0 | Network | Medium | Single | 902 | 4.3 | 6.8 | Network | Medium | None | 14889 | 8.6 | 8.6 | Network | Low | Multiple | 6 | 1.2 | 0 | Network | Low | Single | 1708 | 5.0 | 8.0 | Network | Low | None | 27419 | 10.0 | 10.0 |
|
|
A total of 54432 vulnerabilities in (2012) at .
|