Confidentiality Requirement
|
|
Integrity Requirement
|
|
Availability Requirement
|
|
Modified Attack Vector
|
|
Modified Attack Complexity
|
|
Modified Privileges Required
|
|
Modified User Interaction
|
|
Modified Scope
|
|
Modified Confidentiality
|
|
Modified Integrity
|
|
Modified Availability
|
|