a It means the overflow length of the vulnerability.
b It means the number of corrupted nodes of WVFG.
c It means the number of identified potential exploitable objects.