This is not the latest report. Click
here to view the latest report.
CVSS v3.1 Statistics for OpenAnolis as of 02/08/2024
18
72
9
42
Reference
0-69.9%
|
Reference |
58.3
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2022-1678
(7 of 8)
![]() |
Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) High | Availability (A) High | |||
CVE-2022-36280 (5 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | Applied AV:L due to local vector identified |
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Low | ≠ | Integrity (I) None | No integrity impacts identified | |
Availability (A) High | Availability (A) High | |||
CVE-2022-36402 (5 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | Applied AV:L due to local vector identified |
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Low | ≠ | Integrity (I) None | No integrity impacts identified | |
Availability (A) High | Availability (A) High | |||
CVE-2022-38096 (5 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | Applied AV:L due to local vector identified |
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Low | ≠ | Integrity (I) None | No integrity impacts identified | |
Availability (A) High | Availability (A) High | |||
CVE-2022-38457 (5 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | Applied AV:L due to local vector identified |
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Low | ≠ | Integrity (I) None | No integrity impacts identified | |
Availability (A) High | Availability (A) High | |||
CVE-2022-40133 (5 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | Applied AV:L due to local vector identified |
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Low | ≠ | Integrity (I) None | No integrity impacts identified | |
Availability (A) High | Availability (A) High | |||
CVE-2024-21803 (2 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | AV:L due to file parsed local to vulnerable component |
Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
Confidentiality (C) None | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) None | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-22099 (5 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | AV:L due to file parsed local to vulnerable component |
Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) High | Availability (A) High | |||
CVE-2024-23307 (3 of 8) | Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | AV:L due to file parsed local to vulnerable component |
Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
Privileges Required (PR) High | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) None | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) High | Availability (A) High |