Research Article
A Software Vulnerability Rating Approach Based on the Vulnerability Database
Table 6
Theoretical impact score comparison where
.
| CI | II | AI | | | (v2) |
| None | None | None | 0.2619 | 3.3 | 0.0 | None | None | Partial | 0.4412 | 5.6 | 2.9 | None | None | Complete | 0.5187 | 6.6 | 6.9 | None | Partial | None | 0.4734 | 6.0 | 2.9 | None | Partial | Partial | 0.6013 | 7.6 | 4.9 | None | Partial | Complete | 0.6566 | 8.3 | 7.8 | None | Complete | None | 0.5175 | 6.5 | 6.9 | None | Complete | Partial | 0.6347 | 8.0 | 7.8 | None | Complete | Complete | 0.6854 | 8.7 | 9.2 | Partial | None | None | 0.4453 | 5.6 | 2.9 | Partial | None | Partial | 0.5800 | 7.3 | 4.9 | Partial | None | Complete | 0.6382 | 8.1 | 7.8 | Partial | Partial | None | 0.6042 | 7.6 | 4.9 | Partial | Partial | Partial | 0.7004 | 8.9 | 6.4 | Partial | Partial | Complete | 0.7419 | 9.4 | 8.5 | Partial | Complete | None | 0.6374 | 8.1 | 7.8 | Partial | Complete | Partial | 0.7255 | 9.2 | 8.5 | Partial | Complete | Complete | 0.7635 | 9.7 | 9.5 | Complete | None | None | 0.5093 | 6.4 | 6.9 | Complete | None | Partial | 0.6285 | 8.0 | 7.8 | Complete | None | Complete | 0.6800 | 8.6 | 9.2 | Complete | Partial | None | 0.6499 | 8.2 | 7.8 | Complete | Partial | Partial | 0.7350 | 9.3 | 8.5 | Complete | Partial | Complete | 0.7717 | 9.8 | 9.5 | Complete | Complete | None | 0.6792 | 8.6 | 9.2 | Complete | Complete | Partial | 0.7572 | 9.6 | 9.5 | Complete | Complete | Complete | 0.7908 | 10.0 | 10.0 |
|
|
.
|