Vulnerabilities such as Spectre (speculative 
execution), which many people have deemed safe 
for many years, will become prevalent in the 
cyberspace. Nevertheless, we believe that, first and 
foremost, a modern vulnerability severity 
assessment framework should not be rigid and 
should take into account many evolving factors.  
6 CONCLUSIONS 
In this paper, we analysed what we call rock star 
vulnerabilities which we identified after a thorough 
and rigorous selection procedure. We showed that 
despite the level of stardom of those vulnerabilities, 
only one of them has the maximum numerical score 
in the CVSS. Further analysis showed that there is 
not a single metric in the CVSS that capture the real 
state of those vulnerabilities. Additionally, we found 
that rock star vulnerabilities that have been 
discovered after exploitation and vulnerabilities that 
were discovered before exploitation are rated 
differently with the latter having lower scores than 
the former as if the evaluators were reacting to the 
amount of damage that the vulnerabilities have 
caused in the real world. In conclusion, we believe 
that as a community we have failed to propose a 
standard that succeeds to capture all the facets of a 
vulnerability in order to give it the score it deserves. 
We should devise a vulnerability scoring system that 
is immune from human emotion and yet can capture 
all the facets of a vulnerability. 
REFERENCES 
Mell, P., Scarfone, K. and Romanosky, S., 2007, June. A 
complete guide to the common vulnerability scoring 
system version 2.0. In Published by FIRST-Forum of 
Incident Response and Security Teams (Vol. 1, p. 23). 
FIRST, CVSS (SIG) members, 2015. Common 
Vulnerability Scoring System v3.0: Specification 
Document. In Published by FIRST. Available at 
https://www.first.org/cvss/cvss-v30-specification-
v1.8.pdf [Accessed 27 Sept. 2018]. 
NVD, 2018. National Vulnerability Database. [online]  
Available at https://nvd.nist.gov [Accessed on 29 Sept. 
2018]. 
Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., 
Mangard, S., Kocher, P., Genkin, D., Yarom, Y. and 
Hamburg, M., 2018. Meltdown. arXiv preprint 
arXiv:1801.01207. 
Kocher, P., Genkin, D., Gruss, D., Haas, W., Hamburg, 
M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. 
and Yarom, Y., 2018. Spectre attacks: Exploiting 
speculative execution.  arXiv preprint 
arXiv:1801.01203. 
Vanhoef, M. and Piessens, F., 2016, August. Predicting, 
Decrypting, and Abusing WPA2/802.11 Group Keys. 
In USENIX Security Symposium (pp. 673-688). 
Johnson, P., Lagerstrom, R., Ekstedt, M. and Franke, U., 
2016. Can the Common Vulnerability Scoring System 
be Trusted? A Bayesian Analysis. IEEE Transactions on 
Dependable and Secure Computing, (1), pp.1-1. 
Li, F. and Paxson, V., 2017, October. A large-scale 
empirical study of security patches. In Proceedings of 
the 2017 ACM SIGSAC Conference on Computer and 
Communications Security (pp. 2201-2215). ACM. 
Munaiah, N. and Meneely, A., 2016, November. 
Vulnerability severity scoring and bounties: Why the 
disconnect?. In Proceedings of the 2nd International 
Workshop on Software Analytics (pp. 8-14). ACM. 
Bozorgi, M., Saul, L.K., Savage, S. and Voelker, G.M., 
2010, July. Beyond heuristics: learning to classify 
vulnerabilities and predict exploits. In Proceedings of 
the 16th ACM SIGKDD international conference on 
Knowledge discovery and data mining (pp. 105-114). 
ACM. 
Vijayan, J., 2016. The 10 worst vulnerabilities of the last 10 
years. [online] Darkreading.com. Available at 
https://www.darkreading.com/vulnerabilities---
threats/the-10-worst-vulnerabilities-of-the-last-10-
years/d/d-id/1325425 [Accessed 9 July 2018]. 
Zdnet.com, 2014. Before Heartbleed: Worst vulnerabilities 
ever. [online] Available at 
https://www.zdnet.com/pictures/before-heartbleed-
worst-vulnerabilities-ever/ [Accessed 6 June 2018]. 
Norton.com, 2016. The 8 most famous computer viruses of 
all time. [online] Available at 
https://uk.norton.com/norton-
blog/2016/02/the_8_most_famousco.html [Accessed 20 
June 2018]. 
Jamaluddin, A., 2017. 10 most destructive computer viruses. 
[online] Hongkiat.com. Available at 
https://www.hongkiat.com/blog/famous-malicious-
computer-viruses/ [Accessed 20 July 2018]. 
Wikipedia.org, 2017. Timeline of computer viruses and 
worms. [online] Available at 
https://en.wikipedia.org/wiki/Timeline_of_computer_vi
ruses_and_worms [Accessed 27 August 2018]. 
Ward, M., 2017. WannaCry and the malware hall of fame. 
[online] BBC News. Available at 
https://www.bbc.com/news/technology-39928456 
[Accessed 15 Sept. 2018]. 
Möller, B., Duong, T. and Kotowicz, K., 2014. This 
POODLE bites: exploiting the SSL 3.0 
fallback. Security Advisory. 
Durumeric, Z., Li, F., Kasten, J., Amann, J., Beekman, J., 
Payer, M., Weaver, N., Adrian, D., Paxson, V., Bailey, 
M. and Halderman, J.A., 2014, November. The matter 
of Heartbleed. In Proceedings of the 2014 conference on 
internet measurement conference (pp. 475-488). ACM. 
Kaminsky, D., 2008. Black ops 2008: It’s the end of the 
cache as we know it. Black Hat USA.