Research Article

A Software Vulnerability Rating Approach Based on the Vulnerability Database

Table 7

Comparison of rating results.

ExampleAVACAUCIIIAISecuniaFrSIRTX-ForceCVSS v2SVRA

CVE-2007-1497NLNPNNMedium (3/5)Medium (2/4)Medium (2/3)High (3/3)Medium (2/3)
CVE-2007-1754NMNCCCHigh (4/5)High (3/4)High (3/3)High (3/3)High (3/3)
CVE-2007-1748NLNCCCHigh (4/5)Critical (4/4)High (3/3)High (3/3)High (3/3)
CVE-2007-3338NLNCCCMedium (3/5)Critical (4/4)High (3/3)High (3/3)High (3/3)
CVE-2007-3680LLNCCCLow (2/5)Medium (2/4)High (3/3)High (3/3)High (3/3)
CVE-2007-2242NLNNNCMedium (3/5)Medium (2/4)Low (1/3)High (3/3)Medium (2/3)

ā€œ ā€ denotes the th level of severity levels; the bigger the of a vulnerability, the higher severity level ranking of the vulnerability.