Confidentiality Req. (CR)
<%= hidden_field_tag :cr, @cvss_vector['CR'] %>
Integrity Req. (IR)
<%= hidden_field_tag :ir, @cvss_vector['IR'] %>
Availability Req. (AR)
<%= hidden_field_tag :ar, @cvss_vector['AR'] %>
Mod. Attack Vector (MAV)
<%= hidden_field_tag :mav, @cvss_vector['MAV'] %>
Mod. Attack Complexity (MAC)
<%= hidden_field_tag :mac, @cvss_vector['MAC'] %>
Mod. Privileges Required (MPR)
<%= hidden_field_tag :mpr, @cvss_vector['MPR'] %>
Mod. User Interaction (MUI)
<%= hidden_field_tag :mui, @cvss_vector['MUI'] %>
Mod. Scope (MS)
<%= hidden_field_tag :ms, @cvss_vector['MS'] %>
Mod. Confidentiality (MC)
<%= hidden_field_tag :mc, @cvss_vector['MC'] %>
Mod. Integrity (MI)
<%= hidden_field_tag :mi, @cvss_vector['MI'] %>
Mod. Availability (MA)
<%= hidden_field_tag :ma, @cvss_vector['MA'] %>

These metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user's organization, measured in terms of complementary/alternative security controls in place, Confidentiality, Integrity, and Availability. The metrics are the modified equivalent of base metrics and are assigned metric values based on the component placement in organization infrastructure.