CVSS

Enumerations

enum  cvss_access_vector_t { AV_LOCAL, AV_ADJACENT_NETWORK, AV_NETWORK }
 

Access Vector.

More...
enum  cvss_access_complexity_t { AC_HIGH, AC_MEDIUM, AC_LOW }
 

Access Complexity.

More...
enum  cvss_authentication_t { AU_NONE, AU_SINGLE_INSTANCE, AU_MULTIPLE_INSTANCE }
 

Authentication.

More...
enum  cvss_conf_impact_t { CI_NONE, CI_PARTIAL, CI_COMPLETE }
 

Confidentiality Impact.

More...
enum  cvss_integ_impact_t { II_NONE, II_PARTIAL, II_COMPLETE }
 

Integrity Impact.

More...
enum  cvss_avail_impact_t { AI_NONE, AI_PARTIAL, AI_COMPLETE }
 

Availability Impact.

More...
enum  cvss_exploitability_t {
  EX_UNPROVEN, EX_PROOF_OF_CONCEPT, EX_FUNCTIONAL, EX_HIGH,
  EX_NOT_DEFINED
}
 

Exploitability.

More...
enum  cvss_remediation_level_t {
  RL_OFFICIAL_FIX, RL_TEMPORARY_FIX, RL_WORKAROUND, RL_UNAVAILABLE,
  RL_NOT_DEFINED
}
 

Remediation Level.

More...
enum  cvss_report_confidence_t { RC_UNCONFIRMED, RC_UNCORROBORATED, RC_CONFIRMED, RC_NOT_DEFINED }
 

Report Confidence.

More...
enum  cvss_collateral_damage_potential_t {
  CD_NONE, CD_LOW, CD_LOW_MEDIUM, CD_MEDIUM_HIGH,
  CD_HIGH, CD_NOT_DEFINED
}
 

Collateral Damage Potential.

More...
enum  cvss_target_distribution_t {
  TD_NONE, TD_LOW, TD_MEDIUM, TD_HIGH,
  TD_NOT_DEFINED
}
 

Target Distribution.

More...
enum  cvss_conf_req_t { CR_LOW, CR_MEDIUM, CR_HIGH, CR_NOT_DEFINED }
 

Confidentiality Requirement.

More...
enum  cvss_integ_req_t { IR_LOW, IR_MEDIUM, IR_HIGH, IR_NOT_DEFINED }
 

Integrity Requirement.

More...
enum  cvss_avail_req_t { AR_LOW, AR_MEDIUM, AR_HIGH, AR_NOT_DEFINED }
 

Availabublity Requirement.

More...

Functions

struct cvss_entrycvss_entry_new (void)
void cvss_entry_free (struct cvss_entry *entry)
const char * cvss_entry_get_score (const struct cvss_entry *entry)
const char * cvss_entry_get_AV (const struct cvss_entry *entry)
const char * cvss_entry_get_AC (const struct cvss_entry *entry)
const char * cvss_entry_get_authentication (const struct cvss_entry *entry)
const char * cvss_entry_get_imp_confidentiality (const struct cvss_entry *entry)
const char * cvss_entry_get_imp_integrity (const struct cvss_entry *entry)
const char * cvss_entry_get_imp_availability (const struct cvss_entry *entry)
const char * cvss_entry_get_source (const struct cvss_entry *entry)
const char * cvss_entry_get_generated (const struct cvss_entry *entry)
bool cvss_entry_set_score (struct cvss_entry *entry, const char *new_score)
bool cvss_entry_set_AV (struct cvss_entry *entry, const char *new_AV)
bool cvss_entry_set_AC (struct cvss_entry *entry, const char *new_AC)
bool cvss_entry_set_authentication (struct cvss_entry *entry, const char *new_authentication)
bool cvss_entry_set_imp_confidentiality (struct cvss_entry *entry, const char *new_item)
bool cvss_entry_set_imp_integrity (struct cvss_entry *entry, const char *new_item)
bool cvss_entry_set_imp_availability (struct cvss_entry *entry, const char *new_item)
bool cvss_entry_set_source (struct cvss_entry *entry, const char *new_source)
bool cvss_entry_set_generated (struct cvss_entry *entry, const char *new_generated)
int cvss_base_score (cvss_access_vector_t ave, cvss_access_complexity_t ace, cvss_authentication_t aue, cvss_conf_impact_t cie, cvss_integ_impact_t iie, cvss_avail_impact_t aie, double *base_score, double *impact_score, double *exploitability_score)
int cvss_temp_score (cvss_exploitability_t exe, cvss_remediation_level_t rle, cvss_report_confidence_t rce, double base_score, double *temporal_score)
int cvss_env_score (cvss_collateral_damage_potential_t cde, cvss_target_distribution_t tde, cvss_conf_req_t cre, cvss_integ_req_t ire, cvss_avail_req_t are, double *enviromental_score, cvss_access_vector_t ave, cvss_access_complexity_t ace, cvss_authentication_t aue, cvss_conf_impact_t cie, cvss_integ_impact_t iie, cvss_avail_impact_t aie, cvss_exploitability_t exe, cvss_remediation_level_t rle, cvss_report_confidence_t rce)

Enumeration Type Documentation

Access Complexity.

This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.

Access Vector.

This metric reflects how the vulnerability is exploited.

Enumerator:
AV_LOCAL 

requires local access

AV_ADJACENT_NETWORK 

adjacent network accessible

AV_NETWORK 

network accessible

Authentication.

This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.

Enumerator:
AU_NONE 

requires multiple authentication instances

AU_SINGLE_INSTANCE 

requires single instance of authentication

AU_MULTIPLE_INSTANCE 

requires no authentication

Availability Impact.

This metric measures the impact to availability of a successfully exploited vulnerability.

Availabublity Requirement.

This metric enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in term of availability.

Collateral Damage Potential.

This metric measures the potential for loss of life or physical assets through damage or theft of property or equipment.

Confidentiality Impact.

This metric measures the impact on confidentiality of a successfully exploited vulnerability.

Confidentiality Requirement.

This metric enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in term of confidentiality.

Exploitability.

This metric measures the current state of exploit techniques or code availability.

Integrity Impact.

This metric measures the impact to integrity of a successfully exploited vulnerability.

Integrity Requirement.

This metric enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in term of integrity.

Remediation Level.

The remediation level of a vulnerability is an important factor for prioritization.

Report Confidence.

This metric measures the degree of confidence in the existence of the vulnerability and the credibility of the known technical details.

Target Distribution.

This metric measures the proportion of vulnerable systems. It is meant as an environment-specific indicator in order to approximate the percentage of systems that could be affected by the vulnerability.


Generated on 12 Nov 2009 for Open SCAP Library by  doxygen 1.6.1