In the field of network security, vulnerability evaluation is a very important method to assess the attack and defense means in many practical use, such as penetration testing and safety pre-warning. Up to now, there are a lot of vulnerability evaluate methods, such as CWE, CVSS, and there are a lot of basic evaluate methods for further improvement and optimization. This paper analyzes the existing vulnerability evaluate method and has found some insufficient changes in real-time environmental. This paper adds some new elements including topology environment factors, as well as log system information statistics, to make sure vulnerability evaluation can be used in a more flexible network security.