This is not the latest report. Click
here to view the latest report.
CVSS v2 Statistics for ICS-CERT as of 11/01/2025
103
240
40
188
Reference
0-69.9%
|
|
Contributor |
78.3
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
|
CVE-2014-0787
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | Confidentiality (C) Complete | |||
| Integrity (I) Complete | Integrity (I) Complete | |||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-0789
(5 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Partial | ≠ | Availability (A) Complete | ||
|
CVE-2014-2342
(5 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2343
(5 of 6)
|
Access Vector (AV) Local | Access Vector (AV) Local | ||
| Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2345
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-2346
(6 of 6)
|
Access Vector (AV) Local | Access Vector (AV) Local | ||
| Access Complexity (AC) High | Access Complexity (AC) High | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-2347
(4 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
| Authentication (Au) Single | Authentication (Au) Single | |||
| Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) Partial | ≠ | Integrity (I) None | ||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-2349
(2 of 6)
|
Access Vector (AV) Local | Access Vector (AV) Local | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) Single | ≠ | Authentication (Au) None | ||
| Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) Complete | ≠ | Integrity (I) Partial | ||
| Availability (A) Complete | ≠ | Availability (A) Partial | ||
|
CVE-2014-2350
(2 of 6)
|
Access Vector (AV) Local | ≠ | Access Vector (AV) Network | |
| Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
| Authentication (Au) Single | ≠ | Authentication (Au) None | ||
| Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2351
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2352
(4 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | ≠ | Availability (A) Partial | ||
|
CVE-2014-2353
(4 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | ≠ | Confidentiality (C) None | ||
| Integrity (I) None | ≠ | Integrity (I) Partial | ||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-2354
(0 of 6)
|
Access Vector (AV) Local | ≠ | Access Vector (AV) Network | |
| Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
| Authentication (Au) Single | ≠ | Authentication (Au) None | ||
| Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) Complete | ≠ | Integrity (I) None | ||
| Availability (A) Complete | ≠ | Availability (A) None | ||
|
CVE-2014-2355
(5 of 6)
|
Access Vector (AV) Local | Access Vector (AV) Local | ||
| Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
| Authentication (Au) Single | ≠ | Authentication (Au) None | ||
| Confidentiality (C) Complete | Confidentiality (C) Complete | |||
| Integrity (I) Complete | Integrity (I) Complete | |||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-2356
(5 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-2357
(2 of 6)
|
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | |
| Access Complexity (AC) Low | ≠ | Access Complexity (AC) Medium | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | ≠ | Confidentiality (C) None | ||
| Integrity (I) Complete | ≠ | Integrity (I) None | ||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-2358
(4 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) None | ≠ | Integrity (I) Partial | ||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2360
(4 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) None | ≠ | Integrity (I) Partial | ||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2361
(6 of 6)
|
Access Vector (AV) Local | Access Vector (AV) Local | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | Confidentiality (C) Complete | |||
| Integrity (I) Complete | Integrity (I) Complete | |||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-2362
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | Confidentiality (C) Complete | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-2363
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | Confidentiality (C) Complete | |||
| Integrity (I) Complete | Integrity (I) Complete | |||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-2364
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2365
(5 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) Single | Authentication (Au) Single | |||
| Confidentiality (C) Partial | ≠ | Confidentiality (C) None | ||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2366
(3 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) Single | Authentication (Au) Single | |||
| Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) Complete | ≠ | Integrity (I) None | ||
| Availability (A) Complete | ≠ | Availability (A) None | ||
|
CVE-2014-2367
(3 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | ≠ | Access Complexity (AC) Medium | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | ≠ | Integrity (I) None | ||
| Availability (A) Partial | ≠ | Availability (A) None | ||
|
CVE-2014-2368
(4 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | ≠ | Integrity (I) None | ||
| Availability (A) Partial | ≠ | Availability (A) None | ||
|
CVE-2014-2369
(5 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
| Authentication (Au) Single | Authentication (Au) Single | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2370
(5 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | ≠ | Access Complexity (AC) Medium | ||
| Authentication (Au) Single | Authentication (Au) Single | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-2373
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2374
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2375
(5 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Complete | Availability (A) Complete | |||
|
CVE-2014-2376
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2377
(4 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
| Integrity (I) Partial | ≠ | Integrity (I) None | ||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-2378
(5 of 6)
|
Access Vector (AV) Adjacent Network | Access Vector (AV) Adjacent Network | ||
| Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | Confidentiality (C) Complete | |||
| Integrity (I) Complete | Integrity (I) Complete | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2379
(5 of 6)
|
Access Vector (AV) Adjacent Network | Access Vector (AV) Adjacent Network | ||
| Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial | |||
|
CVE-2014-2380
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Complete | Confidentiality (C) Complete | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-2381
(6 of 6)
|
Access Vector (AV) Local | Access Vector (AV) Local | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-5397
(3 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | ≠ | Access Complexity (AC) Medium | ||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | ≠ | Confidentiality (C) None | ||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | ≠ | Availability (A) None | ||
|
CVE-2014-5398
(6 of 6)
|
Access Vector (AV) Local | Access Vector (AV) Local | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2014-5399
(6 of 6)
|
Access Vector (AV) Network | Access Vector (AV) Network | ||
| Access Complexity (AC) Low | Access Complexity (AC) Low | |||
| Authentication (Au) None | Authentication (Au) None | |||
| Confidentiality (C) Partial | Confidentiality (C) Partial | |||
| Integrity (I) Partial | Integrity (I) Partial | |||
| Availability (A) Partial | Availability (A) Partial |