Expand description
Nested message and enum types in CVSSv3
.
Enums§
- This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability.
- This metric reflects the context by which vulnerability exploitation is possible.
- The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack.
- This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
- The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
- This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.