1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Access Vector (AV)
describes how an attacker would exploit the vulnerability
Physical (P), Local (L), Adjacent network (A), or Network (N)
Access complexity (AC)
Describes the difficulty of exploiting a vulnerability.
High (H) or Low (L)
Privileges required (PR)
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
None (N), Low (L), or High (H)
User Interaction (UI)
measures how much user interaction is required or not.
None (N) or Required (R)
scope (S)
Affects only local machine, or entire security landscape
Unchanged (U) or Changed (C)
Confidentiality (C)
How much does it affect confidentiality?
High (H), Medium (M), or Low (L)
Integrity (I)
How much does it affect integrity?
High (H), Medium (M), or Low (L)
availability (A)
How much does it affect availability?
High (H), Medium (M), or Low (L)
Temporal Metrics
▪ Exploit Code Maturity
▪ Remediation Level
▪ Report Confidence