Package VulnerabilityCVSS

URI: VulnerabilityCVSS

Description: Model of software vulnerabilities based on CVSS v2 metrics.

        (empty)

        (empty)

        (empty)

LossOfExtrinsic-A-TW

Discovery by potential attackers of a vulnerability whose exploitation would compromise asset availability.

LossOfExtrinsic-AU-TW

Discovery by potential attackers of a vulnerability that can be accessed without authentication.

LossOfExtrinsic-C-TW

Discovery by potential attackers of a vulnerability whose exploitation would compromise data confidentiality.

LossOfExtrinsic-I-TW

Discovery by potential attackers of a vulnerability whose exploitation would allow data to be altered.

LossOfExtrinsic-M-TW

Discovery by potential attackers of a vulnerability whose exploitation would allow an attacker to take control.

LossOfExtrinsic-QI-TW

Discovery by potential attackers of a vulnerability whose exploitation would allow an attacker to inject queries that will be passed to a trusting back-end process.

LossOfExtrinsic-U-TW

Discovery by potential attackers of a vulnerability whose exploitation would allow an attacker user level access.

LossOfExtrinsic-VA-TW

Discovery by potential attackers of a vulnerability that can be accessed only from the local network, requiring access to either the broadcast or collision domain of the vulnerable software.

LossOfExtrinsic-VL-TW

Discovery by potential attackers of a vulnerability that can be accessed from a local shell or via physical access.

LossOfExtrinsic-VN-TW

Discovery by potential attackers of a vulnerability that can be accessed from a remote network.

LossOfExtrinsic-W-TW

Discovery by potential attackers of a vulnerability whose exploitation would allow insertion of self-propagating malware.

LossOfExtrinsic-XS-TW

Discovery by potential attackers of a vulnerability in a service whose exploitation would allow injection of malicious scripts into a client process.

        (empty)

        (empty)

        (empty)

        (empty)

Extrinsic-A-TW

Free of software vulnerabilities whose exploitation would compromise asset availability.

Extrinsic-AU-TW

Free of software vulnerabilities that can be accessed without authentication.

Extrinsic-C-TW

Free of software vulnerabilities whose exploitation would compromise confidentiality.

Extrinsic-I-TW

Free of software vulnerabilities whose exploitation would compromise integrity or authenticity of data.

Extrinsic-M-TW

Free of software vulnerabilities whose exploitation would allow an attacker to take control.

Extrinsic-QI-TW

Free of software vulnerabilities that allow injection of queries into a trusting back-end process.

Extrinsic-U-TW

Free of software vulnerabilities whose exploitation would allow an attacker user level access.

Extrinsic-VA-TW

Free of software vulnerabilities that can be accessed only from the local network, requiring access to either the broadcast or collision domain of the vulnerable software.

Extrinsic-VL-TW

Free of software vulnerabilities that can be accessed from a local shell or via physical access.

Extrinsic-VN-TW

Free of software vulnerabilities that can be accessed from a remote network.

Extrinsic-W-TW

Free of software vulnerabilities whose exploitation would allow insertion of self-propagating malware.

Extrinsic-XS-TW

Free of software vulnerabilities that allow injection of malicious scripts into a client process.