Common Vulnerability Scoring System version 4.0: User Guide| FIRST — Forum of Incident Response and Security Teams
Common Vulnerability Scoring System version 4.0: Specification Document| FIRST — Forum of Incident Response and Security Teams
Common Vulnerability Scoring System v4.0: Examples| FIRST — Forum of Incident Response and Security Teams
Copyright © 2015—2025 by Forum of Incident Response and Security Teams, Inc. All Rights Reserved.| FIRST — Forum of Incident Response and Security Teams
Common Vulnerability Scoring System Data Representations| FIRST — Forum of Incident Response and Security Teams
Common Vulnerability Scoring System SIG| FIRST — Forum of Incident Response and Security Teams
Earlier this month, Joanna Rutkowska implemented the “evil maid” attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. Basically, the attack works like this: Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down. Step 2: You boot your computer using the attacker’s hacked bootloader, entering your...| Schneier on Security