CVSSv3 10/24/2022

CVSSv3 Base

≤10
≤20
≤37
≤423
≤519
≤618
≤743
≤826
≤99
≤105

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤37
≤423
≤519
≤646
≤715
≤826
≤99
≤105

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤20
≤37
≤426
≤516
≤623
≤739
≤827
≤97
≤105

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤30
≤40
≤50
≤63
≤70
≤85
≤91
≤107

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤40
≤51
≤66
≤72
≤81
≤90
≤104

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDCNAVendResVulnerabilityCTIEPSSCVE
2121636.36.3
 
 
 
 
Apple Safari WebKit PDF use after free0.000.00000CVE-2022-32922
2121624.34.3
 
 
 
 
Apple Safari WebKit state issue0.070.00000CVE-2022-42824
2121616.36.3
 
 
 
 
Apple Safari WebKit type confusion0.050.00000CVE-2022-42823
2121606.36.3
 
 
 
 
Apple Safari WebKit Remote Code Execution0.040.00000CVE-2022-42799
2121595.35.3
 
 
 
 
Apple macOS WebKit Sandboxing access control0.040.00000CVE-2022-32892
2121586.36.3
 
 
 
 
Apple macOS WebKit PDF use after free0.060.00000CVE-2022-32922
2121574.34.3
 
 
 
 
Apple macOS WebKit state issue0.000.00000CVE-2022-42824
2121566.36.3
 
 
 
 
Apple macOS WebKit type confusion0.040.00000CVE-2022-42823
2121556.36.3
 
 
 
 
Apple macOS WebKit Remote Code Execution0.170.00000CVE-2022-42799
2121546.36.3
 
 
 
 
Apple macOS WebKit out-of-bounds0.050.02806CVE-2022-32912
2121536.36.3
 
 
 
 
Apple macOS WebKit out-of-bounds write0.230.00000CVE-2022-32888
2121526.36.3
 
 
 
 
Apple macOS WebKit buffer overflow0.040.02806CVE-2022-32886
2121513.33.3
 
 
 
 
Apple macOS Weather state issue0.000.00000CVE-2022-32875
2121507.57.5
 
 
 
 
Apple macOS SQLite denial of service0.030.01537CVE-2021-36690
2121497.87.8
 
 
 
 
Apple macOS Software Update race condition0.070.00000CVE-2022-42791
2121488.88.8
 
 
 
 
Apple macOS SMB memory corruption0.090.00000CVE-2022-32934
2121472.42.4
 
 
 
 
Apple macOS Siri state issue0.090.00000CVE-2022-32870
2121462.42.4
 
 
 
 
Apple macOS Sidecar state issue0.100.00000CVE-2022-42790
2121453.33.3
 
 
 
 
Apple macOS Shortcuts information disclosure0.060.00000CVE-2022-32938
2121445.35.3
 
 
 
 
Apple macOS Security Local Privilege Escalation0.030.00000CVE-2022-42793
2121433.33.3
 
 
 
 
Apple macOS Sandbox access control0.000.00000CVE-2022-42811
2121422.32.3
 
 
 
 
Apple macOS Sandbox information disclosure0.080.00000CVE-2022-32862
2121414.44.4
 
 
 
 
Apple macOS Sandbox sandbox0.030.00000CVE-2022-32881
2121406.36.3
 
 
 
 
Apple macOS Ruby memory corruption0.030.01537CVE-2022-28739
2121396.76.7
 
 
 
 
Apple macOS ppp race condition0.070.00000CVE-2022-42832
2121386.76.7
 
 
 
 
Apple macOS ppp race condition0.030.00000CVE-2022-42831
2121376.76.7
 
 
 
 
Apple macOS ppp memory corruption0.000.00000CVE-2022-42830
2121366.76.7
 
 
 
 
Apple macOS ppp use after free0.000.00000CVE-2022-42829
2121355.35.3
 
 
 
 
Apple macOS Photos access control0.000.00000CVE-2022-32918
2121344.44.4
 
 
 
 
Apple macOS PackageKit race condition0.040.00000CVE-2022-32895
2121332.42.4
 
 
 
 
Apple macOS Notifications state issue0.000.00000CVE-2022-32879
2121323.73.7
 
 
 
 
Apple macOS Notes information disclosure0.000.00000CVE-2022-42818
2121316.36.3
 
 
 
 
Apple macOS ncurses denial of service0.040.01108CVE-2022-29458
2121305.35.3
 
 
 
 
Apple macOS ncurses buffer overflow0.040.01537CVE-2021-39537
2121295.35.3
 
 
 
 
Apple macOS MediaLibrary memory corruption0.000.01282CVE-2022-32908
2121283.33.3
 
 
 
 
Apple macOS Maps information disclosure0.000.05487CVE-2022-32883
2121273.33.3
 
 
 
 
Apple macOS Mail access control0.000.00000CVE-2022-42815
2121268.88.8
 
 
 
 
Apple macOS Kernel out-of-bounds write0.260.00000CVE-2022-42808
2121257.87.8
 
 
 
 
Apple macOS Kernel use after free0.050.00000CVE-2022-32914
2121247.87.8
 
 
 
 
Apple macOS Kernel memory corruption0.070.00000CVE-2022-32924
2121237.87.8
 
 
 
 
Apple macOS Kernel memory corruption0.000.01689CVE-2022-32911
2121227.87.8
 
 
 
 
Apple macOS Kernel memory corruption0.000.00000CVE-2022-32866
2121213.33.3
 
 
 
 
Apple macOS Kernel memory corruption0.000.01547CVE-2022-32864
2121207.87.8
 
 
 
 
Apple macOS IOKit race condition0.040.00000CVE-2022-42806
2121195.35.3
 
 
 
 
Apple macOS IOHIDFamily memory corruption0.030.00000CVE-2022-42820
2121183.33.3
 
 
 
 
Apple macOS Intel Graphics Driver out-of-bounds0.040.00000CVE-2022-32936
2121174.34.3
 
 
 
 
Apple macOS ImageIO denial of service0.050.02686CVE-2022-1622
2121163.33.3
 
 
 
 
Apple macOS Image Processing state issue0.000.00000CVE-2022-32913
2121156.36.3
 
 
 
 
Apple macOS Grapher memory corruption0.070.00000CVE-2022-42809
2121147.87.8
 
 
 
 
Apple macOS GPU Drivers memory corruption0.040.00000CVE-2022-32947

100 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!