Research Article

A Software Vulnerability Rating Approach Based on the Vulnerability Database

Table 6

Theoretical impact score comparison where .

CIIIAI (v2)

NoneNoneNone0.26193.30.0
NoneNonePartial0.44125.62.9
NoneNoneComplete0.51876.66.9
NonePartialNone0.47346.02.9
NonePartialPartial0.60137.64.9
NonePartialComplete0.65668.37.8
NoneCompleteNone0.51756.56.9
NoneCompletePartial0.63478.07.8
NoneCompleteComplete0.68548.79.2
PartialNoneNone0.44535.62.9
PartialNonePartial0.58007.34.9
PartialNoneComplete0.63828.17.8
PartialPartialNone0.60427.64.9
PartialPartialPartial0.70048.96.4
PartialPartialComplete0.74199.48.5
PartialCompleteNone0.63748.17.8
PartialCompletePartial0.72559.28.5
PartialCompleteComplete0.76359.79.5
CompleteNoneNone0.50936.46.9
CompleteNonePartial0.62858.07.8
CompleteNoneComplete0.68008.69.2
CompletePartialNone0.64998.27.8
CompletePartialPartial0.73509.38.5
CompletePartialComplete0.77179.89.5
CompleteCompleteNone0.67928.69.2
CompleteCompletePartial0.75729.69.5
CompleteCompleteComplete0.790810.010.0

.