CVSS v3.1 Statistics for Wordfence as of 12/24/2025
7997
320
40
282
Reference
0-69.9%
|
|
Provider |
88.1
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
| CVE-2016-15041 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2017-20192 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2019-25216 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2023-6327 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2023-7067 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-1057 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-2946 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-3345 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-4566 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2024-5530 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-5853 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2024-8964 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-9416 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-9538 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-9582 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-9898 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-10180 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-12853 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2024-13342 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2025-4523 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-4968 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-7502 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-8427 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10006 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10042 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10054 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Attacker as "user" is mentioned, but not identified as high privileges | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10498 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | ≠ | Availability (A) Low | Availability loss appears non-critical | |
| CVE-2025-11160 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-11161 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-11227 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-11823 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-12019 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-12189 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-12426 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-12558 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-13206 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Internet browsing, Link clicking and/or file interaction identified | |
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-13377 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2025-13390 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2025-13534 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-13646 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) High | Attack Complexity (AC) High | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) High | Access level identified as higher than "low" such as SYSTEM or Administrator | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High |