CVSSv3 11/08/2022

CVSSv3 Base

≤10
≤20
≤34
≤415
≤510
≤630
≤718
≤89
≤932
≤101

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤36
≤413
≤514
≤631
≤722
≤831
≤91
≤101

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤21
≤36
≤413
≤512
≤627
≤718
≤89
≤932
≤101

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤30
≤40
≤51
≤60
≤70
≤80
≤90
≤100

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤33
≤41
≤51
≤60
≤70
≤83
≤90
≤100

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤52
≤611
≤76
≤833
≤910
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDCNAVendResVulnerabilityCTIEPSSCVE
2131798.38.8
 
 
7.8
 
Microsoft Windows CNG Key Isolation Service Privilege Escalation0.380.01150CVE-2022-41125
2131785.44.3
 
 
6.5
 
Microsoft SharePoint Server information disclosure0.050.01150CVE-2022-41122
2131778.38.8
 
 
7.8
 
Microsoft Windows Sysmon Privilege Escalation1.520.00885CVE-2022-41120
2131767.06.3
 
 
7.8
 
Microsoft Visual Studio Remote Code Execution0.190.01528CVE-2022-41119
2131757.57.5
 
 
7.5
 
Microsoft Windows Scripting Language Remote Code Execution0.130.01601CVE-2022-41118
2131744.94.3
 
 
5.5
 
Microsoft Windows GDI+ information disclosure0.030.00885CVE-2022-41098
2131738.28.5
 
 
7.8
 
Microsoft Windows Advanced Local Procedure Call Privilege Escalation0.030.00885CVE-2022-41093
2131728.38.8
 
 
7.8
 
Microsoft Windows Win32k Privilege Escalation0.030.00885CVE-2022-41092
2131715.45.4
 
 
5.4
 
Microsoft Windows Mark of the Web unknown vulnerability0.920.00885CVE-2022-41091
2131707.57.5
 
 
7.5
 
Microsoft Azure CycleCloud Remote Code Execution0.070.00885CVE-2022-41085
2131693.32.2
 
 
4.4
 
Microsoft Dynamics 365 Business Central information disclosure0.040.01150CVE-2022-41066
2131687.06.3
 
 
7.8
 
Microsoft Excel Remote Code Execution0.060.01103CVE-2022-41063
2131678.38.8
 
 
7.8
 
Microsoft Windows HTTP.sys Privilege Escalation0.060.01150CVE-2022-41057
2131668.38.8
 
 
7.8
 
Microsoft Windows Resilient File System Privilege Escalation0.090.00885CVE-2022-41054
2131655.45.4
 
 
5.4
 
Microsoft Windows Mark of the Web unknown vulnerability0.440.00885CVE-2022-41049
2131648.88.8
 
 
8.8
 
Microsoft Windows ODBC Driver Remote Code Execution0.380.01601CVE-2022-41047
2131638.28.5
 
 
7.8
 
Microsoft Windows Advanced Local Procedure Call Privilege Escalation0.080.01150CVE-2022-41045
2131627.37.5
 
 
7.0
 
Microsoft Windows Subsystem for Linux/Azure EFLOW Kernel Privilege Escalation0.100.01150CVE-2022-38014
2131618.38.8
 
 
7.8
 
Microsoft Windows Group Policy Privilege Escalation0.040.01150CVE-2022-37992
2131608.88.8
 
 
8.8
 
Microsoft Windows Scripting Language Remote Code Execution3.720.01601CVE-2022-41128
2131598.38.8
 
 
7.8
 
Microsoft Exchange Server Privilege Escalation0.090.01150CVE-2022-41123
2131585.95.9
 
 
5.9
 
Microsoft Windows Point-to-Point Tunneling Protocol denial of service0.000.00885CVE-2022-41116
2131577.37.5
 
 
7.0
 
Microsoft Windows Bind Filter Driver Privilege Escalation0.000.00885CVE-2022-41114
2131568.38.8
 
 
7.8
 
Microsoft Windows Win32 Kernel Subsystem Privilege Escalation0.070.00885CVE-2022-41113
2131558.38.8
 
 
7.8
 
Microsoft Windows Win32k Privilege Escalation0.070.00885CVE-2022-41109
2131547.06.3
 
 
7.8
 
Microsoft Office Graphics Remote Code Execution0.030.01528CVE-2022-41107
2131537.06.3
 
 
7.8
 
Microsoft Excel Remote Code Execution0.030.01103CVE-2022-41106
2131524.94.3
 
 
5.5
 
Microsoft Excel information disclosure0.000.02251CVE-2022-41105
2131514.94.3
 
 
5.5
 
Microsoft Excel information disclosure0.070.02251CVE-2022-41104
2131504.94.3
 
 
5.5
 
Microsoft Word information disclosure0.060.00885CVE-2022-41103
2131498.38.8
 
 
7.8
 
Microsoft Windows Overlay Filter Privilege Escalation0.070.00885CVE-2022-41102
2131488.38.8
 
 
7.8
 
Microsoft Windows Overlay Filter Privilege Escalation0.040.00885CVE-2022-41101
2131478.28.5
 
 
7.8
 
Microsoft Windows Advanced Local Procedure Call Privilege Escalation0.040.00885CVE-2022-41100
2131463.52.4
 
 
4.6
 
Microsoft Windows BitLocker information disclosure0.060.00885CVE-2022-41099
2131455.44.3
 
 
6.5
 
Microsoft Windows Network Policy Server information disclosure0.150.00885CVE-2022-41097
2131448.38.8
 
 
7.8
 
Microsoft Windows DWM Core Library Privilege Escalation0.060.00885CVE-2022-41096
2131438.38.8
 
 
7.8
 
Microsoft Windows Digital Media Receiver Privilege Escalation0.030.00885CVE-2022-41095
2131425.95.9
 
 
5.9
 
Microsoft Windows Point-to-Point Tunneling Protocol denial of service0.000.00885CVE-2022-41090
2131418.18.1
 
 
8.1
 
Microsoft Windows Point-to-Point Tunneling Protocol Remote Code Execution0.060.01156CVE-2022-41088
2131406.56.6
 
 
6.4
 
Microsoft Windows Group Policy Privilege Escalation0.030.01150CVE-2022-41086
2131398.88.8
 
 
8.8
 
Microsoft Exchange Server Privilege Escalation0.270.02251CVE-2022-41080
2131388.48.8
 
 
8.0
 
Microsoft Exchange Server Privilege Escalation0.030.02251CVE-2022-41079
2131378.48.8
 
 
8.0
 
Microsoft Exchange Server Privilege Escalation0.060.02251CVE-2022-41078
2131368.38.8
 
 
7.8
 
Microsoft Windows Print Spooler Privilege Escalation1.080.00885CVE-2022-41073
2131354.63.5
 
 
5.8
 
Microsoft .NET Framework information disclosure0.540.00885CVE-2022-41064
2131348.88.8
 
 
8.8
 
Microsoft SharePoint Server Privilege Escalation0.030.01156CVE-2022-41062
2131337.06.3
 
 
7.8
 
Microsoft Word Remote Code Execution0.120.01103CVE-2022-41061
2131324.94.3
 
 
5.5
 
Microsoft Word information disclosure0.030.00885CVE-2022-41060
2131317.57.5
 
 
7.5
 
Microsoft Windows Server Network Address Translation denial of service0.310.02251CVE-2022-41058
2131307.57.5
 
 
7.5
 
Microsoft Windows Network Policy Server denial of service0.060.02251CVE-2022-41056

69 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!