CVSS v4.0 Statistics for VulDB as of 08/10/2024
658
96
3
87
Reference
0-69.9%
|
|
Reference |
90.6
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
| CVE-2024-7450 (8 of 11) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Attack Requirements (AT) None | Attack Requirements (AT) None | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Vulnerable System Confidentiality (VC) Low | ≠ | Vulnerable System Confidentiality (VC) High | Assessment performed prior to CVMAP efforts | |
| Vulnerable System Integrity (VI) Low | ≠ | Vulnerable System Integrity (VI) High | Assessment performed prior to CVMAP efforts | |
| Vulnerable System Availability (VA) Low | ≠ | Vulnerable System Availability (VA) High | Assessment performed prior to CVMAP efforts | |
| Subsequent System Confidentiality (SC) None | Subsequent System Confidentiality (SC) None | |||
| Subsequent System Integrity (SI) None | Subsequent System Integrity (SI) None | |||
| Subsequent System Availability (SA) None | Subsequent System Availability (SA) None | |||
| CVE-2024-7451 (8 of 11) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Attack Requirements (AT) None | Attack Requirements (AT) None | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Vulnerable System Confidentiality (VC) Low | ≠ | Vulnerable System Confidentiality (VC) High | Assessment performed prior to CVMAP efforts | |
| Vulnerable System Integrity (VI) Low | ≠ | Vulnerable System Integrity (VI) High | Assessment performed prior to CVMAP efforts | |
| Vulnerable System Availability (VA) Low | ≠ | Vulnerable System Availability (VA) High | Assessment performed prior to CVMAP efforts | |
| Subsequent System Confidentiality (SC) None | Subsequent System Confidentiality (SC) None | |||
| Subsequent System Integrity (SI) None | Subsequent System Integrity (SI) None | |||
| Subsequent System Availability (SA) None | Subsequent System Availability (SA) None | |||
| CVE-2024-7452 (8 of 11) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Attack Requirements (AT) None | Attack Requirements (AT) None | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Vulnerable System Confidentiality (VC) Low | ≠ | Vulnerable System Confidentiality (VC) High | Assessment performed prior to CVMAP efforts | |
| Vulnerable System Integrity (VI) Low | ≠ | Vulnerable System Integrity (VI) High | Assessment performed prior to CVMAP efforts | |
| Vulnerable System Availability (VA) Low | ≠ | Vulnerable System Availability (VA) High | Assessment performed prior to CVMAP efforts | |
| Subsequent System Confidentiality (SC) None | Subsequent System Confidentiality (SC) None | |||
| Subsequent System Integrity (SI) None | Subsequent System Integrity (SI) None | |||
| Subsequent System Availability (SA) None | Subsequent System Availability (SA) None |