diff --git a/ssvc-calc/CISA-Coordinator-v2.0.3.json b/ssvc-calc/CISA-Coordinator-v2.0.3.json index 182aedbd..7bffef4b 100644 --- a/ssvc-calc/CISA-Coordinator-v2.0.3.json +++ b/ssvc-calc/CISA-Coordinator-v2.0.3.json @@ -47,7 +47,7 @@ { "label": "partial", "key": "P", - "description": "The exploit gives the adversary limited control over, or information exposure about, the behavior of the software that contains the vulnerability. Or the exploit gives the adversary an importantly low stochastic opportunity for total control. In this context, \"low\" means that the attacker cannot reasona-bly make enough attempts to overcome the low chance of each attempt not working. Denial of service is a form of limited control over the behavior of the vulnerable component." + "description": "The exploit gives the adversary limited control over, or information exposure about, the behavior of the software that contains the vulnerability. Or the exploit gives the adversary an importantly low stochastic opportunity for total control. In this context, \"low\" means that the attacker cannot reasonably make enough attempts to overcome the low chance of each attempt not working. Denial of service is a form of limited control over the behavior of the vulnerable component." }, { "label": "total", diff --git a/ssvc-calc/Supplier-v2.0.0.json b/ssvc-calc/Supplier-v2.0.0.json index 94908f15..52344e81 100644 --- a/ssvc-calc/Supplier-v2.0.0.json +++ b/ssvc-calc/Supplier-v2.0.0.json @@ -187,7 +187,7 @@ { "label": "partial", "key": "P", - "description": "The exploit gives the adversary limited control over, or information exposure about, the behavior of the software that contains the vulnerability. Or the exploit gives the adversary an importantly low stochastic opportunity for total control. In this context, \"low\" means that the attacker cannot reasona-bly make enough attempts to overcome the low chance of each attempt not working. Denial of service is a form of limited control over the behavior of the vulnerable component." + "description": "The exploit gives the adversary limited control over, or information exposure about, the behavior of the software that contains the vulnerability. Or the exploit gives the adversary an importantly low stochastic opportunity for total control. In this context, \"low\" means that the attacker cannot reasonably make enough attempts to overcome the low chance of each attempt not working. Denial of service is a form of limited control over the behavior of the vulnerable component." }, { "label": "total",