Research Article
A Software Vulnerability Rating Approach Based on the Vulnerability Database
Table 7
Comparison of rating results.
| Example | AV | AC | AU | CI | II | AI | Secunia | FrSIRT | X-Force | CVSS v2 | SVRA |
| CVE-2007-1497 | N | L | N | P | N | N | Medium (3/5) | Medium (2/4) | Medium (2/3) | High (3/3) | Medium (2/3) | CVE-2007-1754 | N | M | N | C | C | C | High (4/5) | High (3/4) | High (3/3) | High (3/3) | High (3/3) | CVE-2007-1748 | N | L | N | C | C | C | High (4/5) | Critical (4/4) | High (3/3) | High (3/3) | High (3/3) | CVE-2007-3338 | N | L | N | C | C | C | Medium (3/5) | Critical (4/4) | High (3/3) | High (3/3) | High (3/3) | CVE-2007-3680 | L | L | N | C | C | C | Low (2/5) | Medium (2/4) | High (3/3) | High (3/3) | High (3/3) | CVE-2007-2242 | N | L | N | N | N | C | Medium (3/5) | Medium (2/4) | Low (1/3) | High (3/3) | Medium (2/3) |
|
|
āā denotes the th level of severity levels; the bigger the of a vulnerability, the higher severity level ranking of the vulnerability.
|