This is not the latest report. Click
here to view the latest report.
CVSS v2 Statistics for ICS-CERT as of 07/26/2025
24
144
24
133
Reference
0-69.9%
|
Reference |
92.4
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2012-1977
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2012-4687
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | Access Complexity (AC) High | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-4688
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2012-4898
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | Access Complexity (AC) High | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2012-5861
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
Integrity (I) None | ≠ | Integrity (I) Partial | ||
Availability (A) None | ≠ | Availability (A) Partial | ||
CVE-2012-5862
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-5863
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-5864
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) None | ≠ | Availability (A) Complete | ||
CVE-2012-5972
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2012-6427
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
Integrity (I) None | ≠ | Integrity (I) Partial | ||
Availability (A) None | ≠ | Availability (A) Partial | ||
CVE-2012-6428
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-6435
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-6436
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-6437
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-6438
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-6439
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-6440
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2012-6441
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2012-6442
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0760
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0769
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-9188
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | ≠ | Integrity (I) Partial | ||
Availability (A) Complete | ≠ | Availability (A) Partial | ||
CVE-2014-9190
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-9192
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | ≠ | Availability (A) Partial |