As mentioned, the exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component. Therefore, each of the exploitability metrics listed here should be scored relative to the vulnerable component, and reflect the properties of the vulnerability that leads to a successful attack.