Threats are classified using a number of different applications and methods, including AMP Threat Grid and Cuckoo Sandbox. Each threat prevention/detection/reparation tool works slightly differently, and their scores are not always transparent. The CVSS v3.0 system is open source and transparent, giving comparable results across the board. How exploitable vulnerability is depends on how far away an attacker can be from the target (attack vector), how difficult the exploit is (attack complexity), how trusted an attacker would have to become to be successful (privileges required), and whether anyone else is involved (user interaction). The impact of a vulnerability is measured against the (C)onfidentiality (I)ntegrity (A)vailability triad.
In the next chapter, we will be looking at the fundamental differences between the Windows and Linux operating systems.
...