Research Article
Quantitative Method for Network Security Situation Based on Attack Prediction
Table 2
Hosts configuration and vulnerabilities information in network.
| Host | Service | CVE # | Vulnerability description | ACPX | Weight | Impact | Disclosure date |
| M1 | apache | CVE 2014-0098 | Causing a denial of service | Low | 0.1 | 2.9 | 03/18/2014 |
| M2 | postgresql | CVE 2014-0063 | Executing arbitrary code | Mid | 0.2 | 6.4 | 03/31/2014 |
| M3 | Linux | CVE 2014-0038 | Allowing local users to gain root privileges | High | 0.1 | 10.0 | 02/06/2014 | ms-office | CVE 2013-1324 | Causing stack-based buffer overflow in Microsoft office | Low | 0.1 | 10.0 | 11/12/2013 |
| M4 | bmc | CVE 2013-4782 | Causing bypass authentication | Low | 0.2 | 10.0 | 07/08/2013 |
| M5 | radius | CVE 2014-1878 | Causing segmentation fault | Low | 0.3 | 2.9 | 02/28/2014 |
|
|