This is not the latest report. Click
here to view the latest report.
CVSS v2 Statistics for ICS-CERT as of 09/26/2025
65
240
40
213
Reference
0-69.9%
|
Contributor |
88.8
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2014-0750
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0751
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0752
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | ≠ | Integrity (I) None | ||
Availability (A) Partial | ≠ | Availability (A) None | ||
CVE-2014-0753
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0754
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0755
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) None | ≠ | Availability (A) Complete | ||
CVE-2014-0757
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | ≠ | Availability (A) Partial | ||
CVE-2014-0758
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0759
(6 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0761
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0762
(6 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0763
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0764
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0765
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0766
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0767
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0768
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0770
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0771
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | ≠ | Integrity (I) None | ||
Availability (A) Partial | ≠ | Availability (A) None | ||
CVE-2014-0772
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2014-0773
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0774
(4 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Low | ≠ | Access Complexity (AC) Medium | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0777
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) None | ||
Integrity (I) Partial | ≠ | Integrity (I) None | ||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0778
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2014-0779
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0780
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2014-0781
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0782
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0783
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0784
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0786
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | ≠ | Integrity (I) None | ||
Availability (A) Partial | ≠ | Availability (A) None | ||
CVE-2014-0787
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-0789
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | ≠ | Availability (A) Complete | ||
CVE-2014-9194
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-9195
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
Integrity (I) Complete | ≠ | Integrity (I) Partial | ||
Availability (A) Complete | ≠ | Availability (A) Partial | ||
CVE-2014-9196
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-9197
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | ≠ | Integrity (I) None | ||
Availability (A) Complete | ≠ | Availability (A) None | ||
CVE-2014-9198
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2014-9199
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
Integrity (I) Complete | ≠ | Integrity (I) None | ||
Availability (A) Complete | ≠ | Availability (A) None | ||
CVE-2014-9200
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial |