âšī¸ Skipped - page is already crawled
| Filter | Status | Condition | Details |
|---|---|---|---|
| HTTP status | PASS | download_http_code = 200 | HTTP 200 |
| Age cutoff | PASS | download_stamp > now() - 6 MONTH | 0.1 months ago |
| History drop | PASS | isNull(history_drop_reason) | No drop reason |
| Spam/ban | PASS | fh_dont_index != 1 AND ml_spam_score = 0 | ml_spam_score=0 |
| Canonical | PASS | meta_canonical IS NULL OR = '' OR = src_unparsed | Not set |
| Property | Value |
|---|---|
| URL | https://www.first.org/cvss/calculator/3-1 |
| Last Crawled | 2026-04-06 08:03:49 (3 days ago) |
| First Indexed | 2025-03-11 21:33:08 (1 year ago) |
| HTTP Status Code | 200 |
| Meta Title | Common Vulnerability Scoring System Version 3.1 Calculator |
| Meta Description | null |
| Meta Canonical | null |
| Boilerpipe Text | Hover over metric group names, metric names and metric values for a summary of the information in the official CVSS v3.1 Specification Document.
The Specification is available in the list of links on the left, along with a User Guide providing additional scoring guidance, an Examples document of scored vulnerabilities, and notes on using this calculator (including its design and an XML representation for CVSS v3.1).
Base Score
Attack Vector (AV)
Network (N)
Adjacent (A)
Local (L)
Physical (P)
Attack Complexity (AC)
Low (L)
High (H)
Privileges Required (PR)
None (N)
Low (L)
High (H)
User Interaction (UI)
None (N)
Required (R)
Scope (S)
Unchanged (U)
Changed (C)
Confidentiality (C)
None (N)
Low (L)
High (H)
Integrity (I)
None (N)
Low (L)
High (H)
Availability (A)
None (N)
Low (L)
High (H)
Select values for all base metrics to generate score
Vector String -
select values for all base metrics to generate a vector
Temporal Score
Exploit Code Maturity (E)
Not Defined (X)
Unproven (U)
Proof-of-Concept (P)
Functional (F)
High (H)
Remediation Level (RL)
Not Defined (X)
Official Fix (O)
Temporary Fix (T)
Workaround (W)
Unavailable (U)
Report Confidence (RC)
Not Defined (X)
Unknown (U)
Reasonable (R)
Confirmed (C)
Select values for all base metrics to generate score
Environmental Score
Confidentiality Requirement (CR)
Not Defined (X)
Low (L)
Medium (M)
High (H)
Integrity Requirement (IR)
Not Defined (X)
Low (L)
Medium (M)
High (H)
Availability Requirement (AR)
Not Defined (X)
Low (L)
Medium (M)
High (H)
Modified Attack Vector (MAV)
Not Defined (X)
Network
Adjacent Network
Local
Physical
Modified Attack Complexity (MAC)
Not Defined (X)
Low
High
Modified Privileges Required (MPR)
Not Defined (X)
None
Low
High
Modified User Interaction (MUI)
Not Defined (X)
None
Required
Modified Scope (MS)
Not Defined (X)
Unchanged
Changed
Modified Confidentiality (MC)
Not Defined (X)
None
Low
High
Modified Integrity (MI)
Not Defined (X)
None
Low
High
Modified Availability (MA)
Not Defined (X)
None
Low
High
Select values for all base metrics to generate score |
| Markdown | - [Member Portal](https://portal.first.org/)
[](https://www.first.org/)
- [About FIRST](https://www.first.org/about)
- [Mission Statement](https://www.first.org/about/mission)
- [Strategy Framework](https://www.first.org/about/strategy/)
- [History](https://www.first.org/about/history)
- [Sustainable Development Goals](https://www.first.org/about/sdg)
- [Organization](https://www.first.org/about/organization)
- [Board of Directors](https://www.first.org/about/organization/directors)
- [Operations Team]()
- [Community & Capacity Building](https://www.first.org/about/organization/ccb)
- [Event Office](https://www.first.org/about/organization/events)
- [Executive Director](https://www.first.org/about/organization/executive-director)
- [Infrastructure](https://www.first.org/about/organization/infrastructure)
- [Secretariat](https://www.first.org/about/organization/secretariat)
- [Committees](https://www.first.org/about/organization/committees)
- [Compensation Committee](https://www.first.org/about/organization/committees/compensation-committee)
- [Conference Program Committee](https://www.first.org/about/organization/committees/conference-program-committee)
- [Membership Committee](https://www.first.org/about/organization/committees/membership-committee)
- [Rules Committee](https://www.first.org/about/organization/committees/rules-committee)
- [Standards Committee](https://www.first.org/about/organization/committees/standards)
- [Annual General Meeting](https://www.first.org/events/agm)
- [Annual Reports and Tax Filings](https://www.first.org/about/organization/reports)
- [FIRST Policies](https://www.first.org/about/policies)
- [Anti-Corruption Policy](https://www.first.org/about/policies/anti-corruption)
- [Antitrust Policy](https://www.first.org/about/policies/antitrust)
- [Bylaws](https://www.first.org/about/policies/bylaws)
- [Board duties](https://www.first.org/about/policies/board-duties)
- [Bug Bounty Program](https://www.first.org/about/bugs)
- [Code of Conduct](https://www.first.org/about/policies/code-of-conduct)
- [Conflict of Interest Policy](https://www.first.org/about/policies/conflict-policy)
- [Document Record Retention and Destruction Policy](https://www.first.org/about/policies/doc-rec-retention-policy)
- [FIRST Press Policy](https://www.first.org/newsroom/policy)
- [Guidelines for Site Selection for all FIRST events](https://www.first.org/about/policies/event-site-selection)
- [Identity & Logo Usage](https://www.first.org/identity)
- [Mailing List Policy](https://www.first.org/about/policies/mailing-list)
- [Media Policy](https://www.first.org/about/policies/media)
- [Privacy Policy](https://www.first.org/about/policies/privacy)
- [Registration Terms & Conditions](https://www.first.org/about/policies/registration-terms-conditions)
- [Services Terms of Use](https://www.first.org/about/policies/terms)
- [Standards Policy](https://www.first.org/about/policies/standards)
- [Statement on Diversity & Inclusion](https://www.first.org/about/policies/diversity)
- [Translation Policy](https://www.first.org/about/policies/translation-policy)
- [Travel Policy](https://www.first.org/about/policies/travel-policy)
- [Uniform IPR Policy](https://www.first.org/about/policies/uniform-ipr)
- [Whistleblower Protection Policy](https://www.first.org/about/policies/whistleblower-policy)
- [Partnerships](https://www.first.org/about/partners)
- [Partners](https://www.first.org/global/partners)
- [Friends of FIRST](https://www.first.org/global/friends)
- [FIRST Supporters](https://www.first.org/global/supporters/)
- [FIRST Sponsors](https://www.first.org/about/sponsors)
- [Newsroom](https://www.first.org/newsroom)
- [What's New](https://www.first.org/newsroom/news)
- [Press Releases](https://www.first.org/newsroom/releases)
- [In the News](https://www.first.org/newsroom/news/media)
- [Podcasts](https://www.first.org/podcasts)
- [FIRST Impressions Podcast](https://www.first.org/newsroom/news/first-impressions/)
- [FIRSTCON Podcast](https://www.first.org/newsroom/news/podcasts/)
- [Newsletters](https://www.first.org/newsroom/newsletters)
- [FIRST Press Policy](https://www.first.org/newsroom/policy)
- [Procurement](https://www.first.org/about/procurement)
- [Jobs](https://www.first.org/about/jobs/)
- [Contact](https://www.first.org/contact)
- [Membership](https://www.first.org/members)
- [Becoming a Member](https://www.first.org/membership/)
- [Membership Process for Teams](https://www.first.org/membership/process)
- [Membership Process for Associates](https://www.first.org/membership/process-associates)
- [Membership Process for Liaisons](https://www.first.org/membership/process-liaisons)
- [Membership Fees](https://www.first.org/membership/#Fees)
- [FIRST Teams](https://www.first.org/members/teams/)
- [FIRST Associates](https://www.first.org/members/associates/)
- [FIRST Liaisons](https://www.first.org/members/liaisons/)
- [Members around the world](https://www.first.org/members/map)
- [Initiatives](https://www.first.org/global)
- [Special Interest Groups (SIGs)](https://www.first.org/global/sigs)
- [SIGs Framework](https://www.first.org/global/sigs/framework)
- [Academic Security SIG](https://www.first.org/global/sigs/academicsec)
- [AI Security SIG](https://www.first.org/global/sigs/ai-security)
- [Automation SIG](https://www.first.org/global/sigs/automation)
- [Cybersecurity Communications SIG](https://www.first.org/global/sigs/communications/)
- [Common Vulnerability Scoring System (CVSS-SIG)](https://www.first.org/cvss)
- [Calculator](https://www.first.org/cvss/calculator/4.0)
- [Specification Document](https://www.first.org/cvss/v4.0/specification-document)
- [User Guide](https://www.first.org/cvss/v4.0/user-guide)
- [Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide)
- [Examples](https://www.first.org/cvss/v4.0/examples)
- [Frequently Asked Questions](https://www.first.org/cvss/v4.0/faq)
- [CVSS v4.0 Documentation & Resources](https://www.first.org/cvss/v4.0/)
- [CVSS v4.0 Calculator](https://www.first.org/cvss/calculator/4.0)
- [CVSS v4.0 Specification Document](https://www.first.org/cvss/v4.0/specification-document)
- [CVSS v4.0 User Guide](https://www.first.org/cvss/v4.0/user-guide)
- [CVSS v4.0 Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide)
- [CVSS v4.0 Examples](https://www.first.org/cvss/v4.0/examples)
- [CVSS v4.0 FAQ](https://www.first.org/cvss/v4.0/faq)
- [CVSS v3.1 Archive](https://www.first.org/cvss/v3-1)
- [CVSS v3.1 Calculator](https://www.first.org/cvss/calculator/3.1)
- [CVSS v3.1 Specification Document](https://www.first.org/cvss/v3.1/specification-document)
- [CVSS v3.1 User Guide](https://www.first.org/cvss/v3.1/user-guide)
- [CVSS v3.1 Examples](https://www.first.org/cvss/v3.1/examples)
- [CVSS v3.1 Calculator Use & Design](https://www.first.org/cvss/v3.1/use-design)
- [CVSS v3.0 Archive](https://www.first.org/cvss/v3-0)
- [CVSS v3.0 Calculator](https://www.first.org/cvss/calculator/3.0)
- [CVSS v3.0 Specification Document](https://www.first.org/cvss/v3.0/specification-document)
- [CVSS v3.0 User Guide](https://www.first.org/cvss/v3.0/user-guide)
- [CVSS v3.0 Examples](https://www.first.org/cvss/v3.0/examples)
- [CVSS v3.0 Calculator Use & Design](https://www.first.org/cvss/v3.0/use-design)
- [CVSS v2 Archive](https://www.first.org/cvss/v2)
- [CVSS v2 Complete Documentation](https://www.first.org/cvss/v2/guide)
- [CVSS v2 History](https://www.first.org/cvss/v2/history)
- [CVSS-SIG team](https://www.first.org/cvss/v2/team)
- [SIG Meetings](https://www.first.org/cvss/v2/meetings)
- [Frequently Asked Questions](https://www.first.org/cvss/v2/faq)
- [CVSS Adopters](https://www.first.org/cvss/v2/adopters)
- [CVSS Links](https://www.first.org/cvss/v2/links)
- [CVSS v1 Archive](https://www.first.org/cvss/v1)
- [Introduction to CVSS](https://www.first.org/cvss/v1/intro)
- [Frequently Asked Questions](https://www.first.org/cvss/v1/faq)
- [Complete CVSS v1 Guide](https://www.first.org/cvss/v1/guide)
- [JSON & XML Data Representations](https://www.first.org/cvss/data-representations)
- [CVSS On-Line Training Course](https://www.first.org/cvss/training)
- [Identity & logo usage](https://www.first.org/cvss/identity)
- [CSIRT Framework Development SIG](https://www.first.org/global/sigs/csirt)
- [Cyber Insurance SIG](https://www.first.org/global/sigs/cyberinsurance)
- [Cyber Insurance SIG Webinars](https://www.first.org/global/sigs/cyberinsurance/events)
- [Cyber Threat Intelligence SIG](https://www.first.org/global/sigs/cti)
- [Curriculum](https://www.first.org/global/sigs/cti/curriculum/)
- [Introduction](https://www.first.org/global/sigs/cti/curriculum/introduction)
- [Introduction to CTI as a General topic](https://www.first.org/global/sigs/cti/curriculum/cti-introduction)
- [Methods and Methodology](https://www.first.org/global/sigs/cti/curriculum/methods-methodology)
- [Priority Intelligence Requirement (PIR)](https://www.first.org/global/sigs/cti/curriculum/pir)
- [Source Evaluation and Information Reliability](https://www.first.org/global/sigs/cti/curriculum/source-evaluation)
- [Machine and Human Analysis Techniques (and Intelligence Cycle)](https://www.first.org/global/sigs/cti/curriculum/machine-human)
- [Threat Modelling](https://www.first.org/global/sigs/cti/curriculum/threat-modelling)
- [Training](https://www.first.org/global/sigs/cti/curriculum/training)
- [Standards](https://www.first.org/global/sigs/cti/curriculum/standards)
- [Glossary](https://www.first.org/global/sigs/cti/curriculum/glossary)
- [Communicating Uncertainties in CTI Reporting](https://www.first.org/global/sigs/cti/curriculum/cti-reporting/)
- [Webinars and Online Training](https://www.first.org/global/sigs/cti/events/)
- [Building a CTI program and team](https://www.first.org/global/sigs/cti/cti-program)
- [Program maturity stages](https://www.first.org/global/sigs/cti/cti-program/program-stages)
- [CTI Maturity model - Stage 1](https://www.first.org/global/sigs/cti/cti-program/stage1)
- [CTI Maturity model - Stage 2](https://www.first.org/global/sigs/cti/cti-program/stage2)
- [CTI Maturity model - Stage 3](https://www.first.org/global/sigs/cti/cti-program/stage3)
- [Program Starter Kit](https://www.first.org/global/sigs/cti/cti-program/starter-kit)
- [Resources and supporting materials](https://www.first.org/global/sigs/cti/cti-program/resources)
- [Detection Engineering & Threat Hunting SIG](https://www.first.org/global/sigs/de-th/)
- [Digital Safety SIG](https://www.first.org/global/sigs/digital-safety)
- [DNS Abuse SIG](https://www.first.org/global/sigs/dns)
- [Stakeholder Advice](https://www.first.org/global/sigs/dns/stakeholder-advice/)
- [Detection]()
- [Cache Poisoning](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/cache-poisoning)
- [Creation of Malicious Subdomains Under Dynamic DNS Providers](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/creation-of-malicious-subdomains-under-dynamic-dns-providers)
- [DGA Domains](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dga)
- [DNS As a Vector for DoS](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-as-a-vector-for-dos)
- [DNS Beacons - C2 Communication](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-beacons-c2-communication)
- [DNS Rebinding](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-rebinding)
- [DNS Server Compromise](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-server-compromise)
- [DNS Tunneling](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-tunneling)
- [DoS Against the DNS](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dos-against-the-dns)
- [Domain Name Compromise](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/domain-name-compromise)
- [Dynamic DNS (as obfuscation technique)](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dynamic-dns-resolution-as-obfuscation-technique)
- [Fast Flux (as obfuscation technique)](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/fast-flux)
- [Infiltration and exfiltration via the DNS](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/infiltration-and-exfiltration-via-the-dns)
- [Lame Delegations](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/lame-delegations)
- [Local Resolver Hijacking](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/local-resolver-hijacking)
- [Malicious registration of (effective) second level domains](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/malicious-registration-of-effective-second-level-domains)
- [On-path DNS Attack](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/on-path-dns-attack)
- [Stub Resolver Hijacking](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/stub-resolver-hijacking)
- [Spoofing of a Registered Domain](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/spoofing-of-a-registered-domain)
- [Spoofing of Unregistered Domains](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/spoofing-of-unregistered-domains)
- [Code of Conduct & Other Policies](https://www.first.org/global/sigs/dns/policies)
- [Examples of DNS Abuse](https://www.first.org/global/sigs/dns/dns-abuse-examples)
- [Ethics SIG](https://www.first.org/global/sigs/ethics)
- [Ethics for Incident Response Teams](https://www.first.org/global/sigs/ethics/ethics-first)
- [Exploit Prediction Scoring System (EPSS)](https://www.first.org/epss/)
- [The EPSS Model](https://www.first.org/epss/model)
- [Data and Statistics](https://www.first.org/epss/data_stats)
- [User Guide](https://www.first.org/epss/user-guide)
- [EPSS Research and Presentations](https://www.first.org/epss/research)
- [Frequently Asked Questions](https://www.first.org/epss/faq)
- [Who is using EPSS?](https://www.first.org/epss/who_is_using)
- [Open-source EPSS Tools](https://www.first.org/epss/epss_tools)
- [API](https://www.first.org/epss/api)
- [Related Exploit Research](https://www.first.org/epss/papers)
- [Blog]()
- [Understanding EPSS Probabilities and Percentiles](https://www.first.org/epss/articles/prob_percentile_bins)
- [Log4Shell Use Case](https://www.first.org/epss/articles/log4shell)
- [Estimating CVSS v3 Scores for 100,000 Older Vulnerabilities](https://www.first.org/epss/articles/estimating_old_cvss)
- [Data Partners](https://www.first.org/epss/partners)
- [FIRST Multi-Stakeholder Ransomware SIG](https://www.first.org/global/sigs/msr/)
- [Human Factors in Security SIG](https://www.first.org/global/sigs/hfs/)
- [Industrial Control Systems SIG (ICS-SIG)](https://www.first.org/global/sigs/ics)
- [Information Exchange Policy SIG (IEP-SIG)](https://www.first.org/global/sigs/iep)
- [Information Sharing SIG](https://www.first.org/global/sigs/information-sharing)
- [Malware Information Sharing Platform](https://www.first.org/global/sigs/information-sharing/misp)
- [Law Enforcement SIG](https://www.first.org/global/sigs/le)
- [Malware Analysis SIG](https://www.first.org/global/sigs/malware)
- [Malware Analysis Framework](https://www.first.org/global/sigs/malware/ma-framework)
- [Malware Analysis Tools](https://www.first.org/global/sigs/malware/ma-framework/malwaretools)
- [Metrics SIG](https://www.first.org/global/sigs/metrics)
- [Metrics SIG Webinars](https://www.first.org/global/sigs/metrics/events)
- [NETSEC SIG](https://www.first.org/global/sigs/netsec/)
- [Public Policy SIG](https://www.first.org/global/sigs/policy)
- [PSIRT SIG](https://www.first.org/global/sigs/psirt)
- [Red Team SIG](https://www.first.org/global/sigs/red-team)
- [Security Lounge SIG](https://www.first.org/global/sigs/ctf)
- [Security Operations Center SIG](https://www.first.org/global/sigs/soc/)
- [Strategic Thinking and Planning SIG](https://www.first.org/global/sigs/stp/)
- [Threat Intel Coalition SIG](https://www.first.org/global/sigs/tic/)
- [Membership Requirements and Veto Rules](https://www.first.org/global/sigs/tic/membership-rules)
- [Time SIG](https://www.first.org/global/sigs/time/)
- [Traffic Light Protocol (TLP-SIG)](https://www.first.org/global/sigs/tlp)
- [Transportation and Mobility SIG](https://www.first.org/global/sigs/transport)
- [Vulnerability Coordination](https://www.first.org/global/sigs/vulnerability-coordination)
- [Multi-Party Vulnerability Coordination and Disclosure](https://www.first.org/global/sigs/vulnerability-coordination/multiparty)
- [Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure](https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines)
- [Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)](https://www.first.org/global/sigs/vrdx)
- [Vulnerability Database Catalog](https://www.first.org/global/sigs/vrdx/vdb-catalog)
- [Women of FIRST](https://www.first.org/global/sigs/wof)
- [CCB Initiatives](https://www.first.org/global/ccb-initiatives)
- [FIRST CORE](https://www.first.org/global/core)
- [Sponsorship Opportunities](https://www.first.org/global/core/sponsorship)
- [Internet Governance](https://www.first.org/global/governance)
- [IR Database](https://www.first.org/global/irt-database)
- [Fellowship Program](https://www.first.org/global/fellowship)
- [Application Form](https://portal.first.org/fellowship)
- [Mentorship Program](https://www.first.org/global/mentorship)
- [IR Hall of Fame](https://www.first.org/hof)
- [Hall of Fame Inductees](https://www.first.org/hof/inductees)
- [Victim Notification](https://www.first.org/global/victim-notification)
- [Volunteers at FIRST](https://www.first.org/volunteers/)
- [FIRST Volunteers](https://www.first.org/volunteers/list)
- [Member Spotlight](https://www.first.org/global/spotlight)
- [Previous Activities](https://www.first.org/cvss/calculator/3-1#new)
- [Best Practices Contest](https://www.first.org/global/practices)
- [Standards & Publications](https://www.first.org/standards)
- [Standards](https://www.first.org/standards)
- [Common Vulnerability Scoring System (CVSS-SIG)](https://www.first.org/cvss)
- [Traffic Light Protocol (TLP)](https://www.first.org/tlp)
- [TLP Use Cases](https://www.first.org/tlp/use-cases)
- [Service Frameworks](https://www.first.org/standards/frameworks/)
- [CSIRT Services Framework](https://www.first.org/standards/frameworks/csirts)
- [PSIRT Services Framework](https://www.first.org/standards/frameworks/psirts)
- [Information Exchange Policy (IEP)](https://www.first.org/iep)
- [IEP 2.0 Framework](https://www.first.org/iep/iep_framework_2_0)
- [IEP 2.0 JSON Specification](https://www.first.org/iep/iep-json-2_0)
- [Standard IEP Policies](https://www.first.org/iep/iep-polices)
- [IEP TLP Policy File](https://www.first.org/iep/2.0/first-tlp-iep.iepj)
- [IEP Unknown Policy File](https://www.first.org/iep/2.0/first-unknown-iep.iepj)
- [IEP 1.0 Archive](https://www.first.org/iep/iep_v1_0)
- [Passive DNS Exchange](https://www.first.org/global/sigs/passive-dns)
- [Exploit Prediction Scoring System (EPSS)](https://www.first.org/epss)
- [Publications](https://www.first.org/resources/papers)
- [Events](https://www.first.org/events)
- [Education](https://www.first.org/education)
- [FIRST Training](https://www.first.org/education/first-training)
- [Training Courses](https://www.first.org/education/trainings)
- [FIRST Trainers](https://www.first.org/education/trainers)
- [Blog](https://www.first.org/blog)
[JoinDetails about FIRST membership and joining as a full member or liaison.](https://www.first.org/join)[LearnTraining and workshop opportunities, and details about the FIRST learning platform.](https://www.first.org/learn)[ParticipateRead about upcoming events, SIGs, and know what is going on.](https://www.first.org/participate)[CommunityCommunity and Capacity Building.](https://www.first.org/community)
This page requires JavaScript. If you have disabled scripting, please enable it.

# Common Vulnerability Scoring System Version 3.1 Calculator
- [Common Vulnerability Scoring System (CVSS-SIG)](https://www.first.org/cvss/)
- [Calculator](https://www.first.org/cvss/calculator/4.0)
- [Specification Document](https://www.first.org/cvss/v4.0/specification-document)
- [User Guide](https://www.first.org/cvss/v4.0/user-guide)
- [Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide)
- [Examples](https://www.first.org/cvss/v4.0/examples)
- [Frequently Asked Questions](https://www.first.org/cvss/v4.0/faq)
- [CVSS v4.0 Documentation & Resources](https://www.first.org/cvss/v4.0/)
- [CVSS v4.0 Calculator](https://www.first.org/cvss/calculator/4.0)
- [CVSS v4.0 Specification Document](https://www.first.org/cvss/v4.0/specification-document)
- [CVSS v4.0 User Guide](https://www.first.org/cvss/v4.0/user-guide)
- [CVSS v4.0 Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide)
- [CVSS v4.0 Examples](https://www.first.org/cvss/v4.0/examples)
- [CVSS v4.0 FAQ](https://www.first.org/cvss/v4.0/faq)
- [CVSS v3.1 Archive](https://www.first.org/cvss/v3-1)
- [CVSS v3.1 Calculator](https://www.first.org/cvss/calculator/3.1)
- [CVSS v3.1 Specification Document](https://www.first.org/cvss/v3.1/specification-document)
- [CVSS v3.1 User Guide](https://www.first.org/cvss/v3.1/user-guide)
- [CVSS v3.1 Examples](https://www.first.org/cvss/v3.1/examples)
- [CVSS v3.1 Calculator Use & Design](https://www.first.org/cvss/v3.1/use-design)
- [CVSS v3.0 Archive](https://www.first.org/cvss/v3-0)
- [CVSS v3.0 Calculator](https://www.first.org/cvss/calculator/3.0)
- [CVSS v3.0 Specification Document](https://www.first.org/cvss/v3.0/specification-document)
- [CVSS v3.0 User Guide](https://www.first.org/cvss/v3.0/user-guide)
- [CVSS v3.0 Examples](https://www.first.org/cvss/v3.0/examples)
- [CVSS v3.0 Calculator Use & Design](https://www.first.org/cvss/v3.0/use-design)
- [CVSS v2 Archive](https://www.first.org/cvss/v2)
- [CVSS v2 Complete Documentation](https://www.first.org/cvss/v2/guide)
- [CVSS v2 History](https://www.first.org/cvss/v2/history)
- [CVSS-SIG team](https://www.first.org/cvss/v2/team)
- [SIG Meetings](https://www.first.org/cvss/v2/meetings)
- [Frequently Asked Questions](https://www.first.org/cvss/v2/faq)
- [CVSS Adopters](https://www.first.org/cvss/v2/adopters)
- [CVSS Links](https://www.first.org/cvss/v2/links)
- [CVSS v1 Archive](https://www.first.org/cvss/v1)
- [Introduction to CVSS](https://www.first.org/cvss/v1/intro)
- [Frequently Asked Questions](https://www.first.org/cvss/v1/faq)
- [Complete CVSS v1 Guide](https://www.first.org/cvss/v1/guide)
- [JSON & XML Data Representations](https://www.first.org/cvss/data-representations)
- [CVSS On-Line Training Course](https://www.first.org/cvss/training)
- [Identity & logo usage](https://www.first.org/cvss/identity)
[Copyright](https://www.first.org/copyright) Š 2015â2026 by Forum of Incident Response and Security Teams, Inc. All Rights Reserved. |
| Readable Markdown | Hover over metric group names, metric names and metric values for a summary of the information in the official CVSS v3.1 Specification Document. The Specification is available in the list of links on the left, along with a User Guide providing additional scoring guidance, an Examples document of scored vulnerabilities, and notes on using this calculator (including its design and an XML representation for CVSS v3.1).
Base Score
### Attack Vector (AV)
Network (N) Adjacent (A) Local (L) Physical (P)
### Attack Complexity (AC)
Low (L) High (H)
### Privileges Required (PR)
None (N) Low (L) High (H)
### User Interaction (UI)
None (N) Required (R)
### Scope (S)
Unchanged (U) Changed (C)
### Confidentiality (C)
None (N) Low (L) High (H)
### Integrity (I)
None (N) Low (L) High (H)
### Availability (A)
None (N) Low (L) High (H)
Select values for all base metrics to generate score
Vector String - select values for all base metrics to generate a vector
Temporal Score
### Exploit Code Maturity (E)
Not Defined (X) Unproven (U) Proof-of-Concept (P) Functional (F) High (H)
### Remediation Level (RL)
Not Defined (X) Official Fix (O) Temporary Fix (T) Workaround (W) Unavailable (U)
### Report Confidence (RC)
Not Defined (X) Unknown (U) Reasonable (R) Confirmed (C)
Select values for all base metrics to generate score
Environmental Score
### Confidentiality Requirement (CR)
Not Defined (X) Low (L) Medium (M) High (H)
### Integrity Requirement (IR)
Not Defined (X) Low (L) Medium (M) High (H)
### Availability Requirement (AR)
Not Defined (X) Low (L) Medium (M) High (H)
### Modified Attack Vector (MAV)
Not Defined (X) Network Adjacent Network Local Physical
### Modified Attack Complexity (MAC)
Not Defined (X) Low High
### Modified Privileges Required (MPR)
Not Defined (X) None Low High
### Modified User Interaction (MUI)
Not Defined (X) None Required
### Modified Scope (MS)
Not Defined (X) Unchanged Changed
### Modified Confidentiality (MC)
Not Defined (X) None Low High
### Modified Integrity (MI)
Not Defined (X) None Low High
### Modified Availability (MA)
Not Defined (X) None Low High
Select values for all base metrics to generate score |
| Shard | 189 (laksa) |
| Root Hash | 11567983919469339389 |
| Unparsed URL | org,first!www,/cvss/calculator/3-1 s443 |