CVSSv3 10/11/2022

CVSSv3 Base

≤10
≤20
≤312
≤414
≤531
≤632
≤740
≤817
≤951
≤104

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤314
≤414
≤534
≤639
≤740
≤849
≤99
≤102

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤20
≤315
≤415
≤541
≤626
≤734
≤819
≤947
≤104

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤31
≤41
≤51
≤62
≤75
≤89
≤93
≤100

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤31
≤41
≤54
≤615
≤713
≤856
≤918
≤106

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDCNAVendResVulnerabilityCTIEPSSCVE
2106415.44.3
 
 
6.5
 
Microsoft Windows NTLM information disclosure0.030.02251CVE-2022-35770
2105474.34.3
 
 
4.3
 
Microsoft Windows Workstation Service denial of service0.160.01150CVE-2022-38034
2105468.38.8
 
 
7.8
 
Microsoft Windows WLAN Service Privilege Escalation0.000.01150CVE-2022-37984
2105458.38.8
 
 
7.8
 
Microsoft Windows Win32k Privilege Escalation0.030.01150CVE-2022-38050
2105445.24.3
 
 
6.2
 
Microsoft Windows Web Account Manager information disclosure0.050.02251CVE-2022-38046
2105433.22.1
 
 
4.3
 
Microsoft Windows USB Serial Driver information disclosure0.050.01150CVE-2022-38030
2105427.57.5
 
 
7.5
 
Microsoft Windows TCP/IP Driver denial of service0.030.02251CVE-2022-33645
2105417.37.5
 
 
7.0
 
Microsoft Windows Storage Privilege Escalation0.000.01150CVE-2022-38027
2105408.88.8
 
 
8.8
 
Microsoft Windows Server Service Privilege Escalation0.210.02251CVE-2022-38045
2105395.44.3
 
 
6.5
 
Microsoft Windows Registry Key information disclosure0.000.01150CVE-2022-38033
2105384.94.3
 
 
5.5
 
Microsoft Windows Security Support Provider Interface information disclosure0.040.02251CVE-2022-38043
2105377.57.5
 
 
7.5
 
Microsoft Windows Secure Channel denial of service0.000.02251CVE-2022-38041
2105368.38.8
 
 
7.8
 
Microsoft Windows Resilient File System Privilege Escalation0.000.01150CVE-2022-38003
2105358.38.8
 
 
7.8
 
Microsoft Windows Print Spooler Privilege Escalation0.040.01150CVE-2022-38028
2105346.36.6
 
 
5.9
 
Microsoft Windows Portable Device Enumerator Service Local Privilege Escalation0.060.02251CVE-2022-38032
2105338.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.000.01601CVE-2022-38000
2105328.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.000.01601CVE-2022-30198
2105318.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.160.01601CVE-2022-41081
2105308.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.040.01601CVE-2022-38047
2105298.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.040.01601CVE-2022-24504
2105288.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.160.01601CVE-2022-22035
2105278.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.000.01601CVE-2022-33634
2105265.44.3
 
 
6.5
 
Microsoft Windows Mixed Reality Developer Tools information disclosure0.070.02251CVE-2022-37974
2105258.88.8
 
 
8.8
 
Microsoft Windows ODBC Driver Remote Code Execution0.050.01601CVE-2022-38040
2105244.94.3
 
 
5.5
 
Microsoft Windows Kernel information disclosure0.060.01150CVE-2022-37996
2105237.77.7
 
 
7.7
 
Microsoft Windows Local Session Manager denial of service0.030.01150CVE-2022-37998
2105227.77.7
 
 
7.7
 
Microsoft Windows Local Session Manager denial of service0.060.02251CVE-2022-37973
2105216.56.5
 
 
6.5
 
Microsoft Windows LSASS denial of service0.060.01150CVE-2022-37977
2105209.49.9
 
 
8.8
 
Microsoft Windows Local Security Authority Privilege Escalation0.040.01150CVE-2022-38016
2105192.83.1
 
 
2.5
 
Microsoft Windows Kernel unknown vulnerability0.000.01150CVE-2022-38022
2105188.38.8
 
 
7.8
 
Microsoft Windows Kernel Privilege Escalation0.060.01150CVE-2022-37991
2105178.38.8
 
 
7.8
 
Microsoft Windows Kernel Privilege Escalation0.000.01150CVE-2022-37995
2105168.38.8
 
 
7.8
 
Microsoft Windows Kernel Privilege Escalation0.040.01150CVE-2022-38039
2105158.38.8
 
 
7.8
 
Microsoft Windows Kernel Privilege Escalation0.040.01150CVE-2022-38038
2105148.38.8
 
 
7.8
 
Microsoft Windows Kernel Privilege Escalation0.120.01150CVE-2022-37990
2105138.38.8
 
 
7.8
 
Microsoft Windows Kernel Privilege Escalation0.090.01150CVE-2022-38037
2105128.38.8
 
 
7.8
 
Microsoft Windows Kernel Privilege Escalation0.040.01150CVE-2022-37988
2105117.57.5
 
 
7.5
 
Microsoft Windows IKE Protocol denial of service0.090.02251CVE-2022-38036
2105108.38.8
 
 
7.8
 
Microsoft Windows Group Policy Preference Client Privilege Escalation0.160.01150CVE-2022-37999
2105098.38.8
 
 
7.8
 
Microsoft Windows Group Policy Preference Client Privilege Escalation0.030.01150CVE-2022-37993
2105088.38.8
 
 
7.8
 
Microsoft Windows Group Policy Preference Client Privilege Escalation0.090.01150CVE-2022-37994
2105078.38.8
 
 
7.8
 
Microsoft Windows Group Policy Privilege Escalation0.030.01150CVE-2022-37975
2105064.34.3
 
 
4.3
 
Microsoft Windows Event Logging Service denial of service0.090.01150CVE-2022-37981
2105058.38.8
 
 
7.8
 
Microsoft Windows DWM Core Library Privilege Escalation0.120.01150CVE-2022-37983
2105048.38.8
 
 
7.8
 
Microsoft Windows DWM Core Library Privilege Escalation0.070.01150CVE-2022-37970
2105034.94.3
 
 
5.5
 
Microsoft Windows Distributed File System information disclosure0.060.01150CVE-2022-38025
2105028.38.8
 
 
7.8
 
Microsoft Windows DHCP Client Privilege Escalation0.100.01150CVE-2022-37980
2105014.94.3
 
 
5.5
 
Microsoft Windows DHCP Client information disclosure0.030.01150CVE-2022-38026
2105006.76.3
 
 
7.1
 
Microsoft Malware Protection Engine Defender Privilege Escalation0.070.01150CVE-2022-37971
2104996.45.3
 
 
7.5
 
Microsoft Windows CryptoAPI unknown vulnerability0.300.02251CVE-2022-34689

151 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!