Package VulnerabilityCVSS
URI: VulnerabilityCVSS
Description: Model of software vulnerabilities based on CVSS v2 metrics.
        (empty)
        (empty)
        (empty)
Discovery by potential attackers of a vulnerability whose exploitation would compromise asset availability. |
|
Discovery by potential attackers of a vulnerability that can be accessed without authentication. |
|
Discovery by potential attackers of a vulnerability whose exploitation would compromise data confidentiality. |
|
Discovery by potential attackers of a vulnerability whose exploitation would allow data to be altered. |
|
Discovery by potential attackers of a vulnerability whose exploitation would allow an attacker to take control. |
|
Discovery by potential attackers of a vulnerability whose exploitation would allow an attacker to inject queries that will be passed to a trusting back-end process. |
|
Discovery by potential attackers of a vulnerability whose exploitation would allow an attacker user level access. |
|
Discovery by potential attackers of a vulnerability that can be accessed only from the local network, requiring access to either the broadcast or collision domain of the vulnerable software. |
|
Discovery by potential attackers of a vulnerability that can be accessed from a local shell or via physical access. |
|
Discovery by potential attackers of a vulnerability that can be accessed from a remote network. |
|
Discovery by potential attackers of a vulnerability whose exploitation would allow insertion of self-propagating malware. |
|
Discovery by potential attackers of a vulnerability in a service whose exploitation would allow injection of malicious scripts into a client process. |
Free of software vulnerabilities whose exploitation would compromise asset availability. |
|
Free of software vulnerabilities that can be accessed without authentication. |
|
Free of software vulnerabilities whose exploitation would compromise confidentiality. |
|
Free of software vulnerabilities whose exploitation would compromise integrity or authenticity of data. |
|
Free of software vulnerabilities whose exploitation would allow an attacker to take control. |
|
Free of software vulnerabilities that allow injection of queries into a trusting back-end process. |
|
Free of software vulnerabilities whose exploitation would allow an attacker user level access. |
|
Free of software vulnerabilities that can be accessed only from the local network, requiring access to either the broadcast or collision domain of the vulnerable software. |
|
Free of software vulnerabilities that can be accessed from a local shell or via physical access. |
|
Free of software vulnerabilities that can be accessed from a remote network. |
|
Free of software vulnerabilities whose exploitation would allow insertion of self-propagating malware. |
|
Free of software vulnerabilities that allow injection of malicious scripts into a client process. |