đŸ•ˇī¸ Crawler Inspector

URL Lookup

Direct Parameter Lookup

Raw Queries and Responses

1. Shard Calculation

Query:
Response:
Calculated Shard: 189 (from laksa094)

2. Crawled Status Check

Query:
Response:

3. Robots.txt Check

Query:
Response:

4. Spam/Ban Check

Query:
Response:

5. Seen Status Check

â„šī¸ Skipped - page is already crawled

📄
INDEXABLE
✅
CRAWLED
3 days ago
🤖
ROBOTS ALLOWED

Page Info Filters

FilterStatusConditionDetails
HTTP statusPASSdownload_http_code = 200HTTP 200
Age cutoffPASSdownload_stamp > now() - 6 MONTH0.1 months ago
History dropPASSisNull(history_drop_reason)No drop reason
Spam/banPASSfh_dont_index != 1 AND ml_spam_score = 0ml_spam_score=0
CanonicalPASSmeta_canonical IS NULL OR = '' OR = src_unparsedNot set

Page Details

PropertyValue
URLhttps://www.first.org/cvss/calculator/3-1
Last Crawled2026-04-06 08:03:49 (3 days ago)
First Indexed2025-03-11 21:33:08 (1 year ago)
HTTP Status Code200
Meta TitleCommon Vulnerability Scoring System Version 3.1 Calculator
Meta Descriptionnull
Meta Canonicalnull
Boilerpipe Text
Hover over metric group names, metric names and metric values for a summary of the information in the official CVSS v3.1 Specification Document. The Specification is available in the list of links on the left, along with a User Guide providing additional scoring guidance, an Examples document of scored vulnerabilities, and notes on using this calculator (including its design and an XML representation for CVSS v3.1). Base Score Attack Vector (AV) Network (N) Adjacent (A) Local (L) Physical (P) Attack Complexity (AC) Low (L) High (H) Privileges Required (PR) None (N) Low (L) High (H) User Interaction (UI) None (N) Required (R) Scope (S) Unchanged (U) Changed (C) Confidentiality (C) None (N) Low (L) High (H) Integrity (I) None (N) Low (L) High (H) Availability (A) None (N) Low (L) High (H) Select values for all base metrics to generate score Vector String - select values for all base metrics to generate a vector Temporal Score Exploit Code Maturity (E) Not Defined (X) Unproven (U) Proof-of-Concept (P) Functional (F) High (H) Remediation Level (RL) Not Defined (X) Official Fix (O) Temporary Fix (T) Workaround (W) Unavailable (U) Report Confidence (RC) Not Defined (X) Unknown (U) Reasonable (R) Confirmed (C) Select values for all base metrics to generate score Environmental Score Confidentiality Requirement (CR) Not Defined (X) Low (L) Medium (M) High (H) Integrity Requirement (IR) Not Defined (X) Low (L) Medium (M) High (H) Availability Requirement (AR) Not Defined (X) Low (L) Medium (M) High (H) Modified Attack Vector (MAV) Not Defined (X) Network Adjacent Network Local Physical Modified Attack Complexity (MAC) Not Defined (X) Low High Modified Privileges Required (MPR) Not Defined (X) None Low High Modified User Interaction (MUI) Not Defined (X) None Required Modified Scope (MS) Not Defined (X) Unchanged Changed Modified Confidentiality (MC) Not Defined (X) None Low High Modified Integrity (MI) Not Defined (X) None Low High Modified Availability (MA) Not Defined (X) None Low High Select values for all base metrics to generate score
Markdown
- [Member Portal](https://portal.first.org/) [![FIRST.Org](https://www.first.org/_/img/first-org-green.svg)](https://www.first.org/) - [About FIRST](https://www.first.org/about) - [Mission Statement](https://www.first.org/about/mission) - [Strategy Framework](https://www.first.org/about/strategy/) - [History](https://www.first.org/about/history) - [Sustainable Development Goals](https://www.first.org/about/sdg) - [Organization](https://www.first.org/about/organization) - [Board of Directors](https://www.first.org/about/organization/directors) - [Operations Team]() - [Community & Capacity Building](https://www.first.org/about/organization/ccb) - [Event Office](https://www.first.org/about/organization/events) - [Executive Director](https://www.first.org/about/organization/executive-director) - [Infrastructure](https://www.first.org/about/organization/infrastructure) - [Secretariat](https://www.first.org/about/organization/secretariat) - [Committees](https://www.first.org/about/organization/committees) - [Compensation Committee](https://www.first.org/about/organization/committees/compensation-committee) - [Conference Program Committee](https://www.first.org/about/organization/committees/conference-program-committee) - [Membership Committee](https://www.first.org/about/organization/committees/membership-committee) - [Rules Committee](https://www.first.org/about/organization/committees/rules-committee) - [Standards Committee](https://www.first.org/about/organization/committees/standards) - [Annual General Meeting](https://www.first.org/events/agm) - [Annual Reports and Tax Filings](https://www.first.org/about/organization/reports) - [FIRST Policies](https://www.first.org/about/policies) - [Anti-Corruption Policy](https://www.first.org/about/policies/anti-corruption) - [Antitrust Policy](https://www.first.org/about/policies/antitrust) - [Bylaws](https://www.first.org/about/policies/bylaws) - [Board duties](https://www.first.org/about/policies/board-duties) - [Bug Bounty Program](https://www.first.org/about/bugs) - [Code of Conduct](https://www.first.org/about/policies/code-of-conduct) - [Conflict of Interest Policy](https://www.first.org/about/policies/conflict-policy) - [Document Record Retention and Destruction Policy](https://www.first.org/about/policies/doc-rec-retention-policy) - [FIRST Press Policy](https://www.first.org/newsroom/policy) - [Guidelines for Site Selection for all FIRST events](https://www.first.org/about/policies/event-site-selection) - [Identity & Logo Usage](https://www.first.org/identity) - [Mailing List Policy](https://www.first.org/about/policies/mailing-list) - [Media Policy](https://www.first.org/about/policies/media) - [Privacy Policy](https://www.first.org/about/policies/privacy) - [Registration Terms & Conditions](https://www.first.org/about/policies/registration-terms-conditions) - [Services Terms of Use](https://www.first.org/about/policies/terms) - [Standards Policy](https://www.first.org/about/policies/standards) - [Statement on Diversity & Inclusion](https://www.first.org/about/policies/diversity) - [Translation Policy](https://www.first.org/about/policies/translation-policy) - [Travel Policy](https://www.first.org/about/policies/travel-policy) - [Uniform IPR Policy](https://www.first.org/about/policies/uniform-ipr) - [Whistleblower Protection Policy](https://www.first.org/about/policies/whistleblower-policy) - [Partnerships](https://www.first.org/about/partners) - [Partners](https://www.first.org/global/partners) - [Friends of FIRST](https://www.first.org/global/friends) - [FIRST Supporters](https://www.first.org/global/supporters/) - [FIRST Sponsors](https://www.first.org/about/sponsors) - [Newsroom](https://www.first.org/newsroom) - [What's New](https://www.first.org/newsroom/news) - [Press Releases](https://www.first.org/newsroom/releases) - [In the News](https://www.first.org/newsroom/news/media) - [Podcasts](https://www.first.org/podcasts) - [FIRST Impressions Podcast](https://www.first.org/newsroom/news/first-impressions/) - [FIRSTCON Podcast](https://www.first.org/newsroom/news/podcasts/) - [Newsletters](https://www.first.org/newsroom/newsletters) - [FIRST Press Policy](https://www.first.org/newsroom/policy) - [Procurement](https://www.first.org/about/procurement) - [Jobs](https://www.first.org/about/jobs/) - [Contact](https://www.first.org/contact) - [Membership](https://www.first.org/members) - [Becoming a Member](https://www.first.org/membership/) - [Membership Process for Teams](https://www.first.org/membership/process) - [Membership Process for Associates](https://www.first.org/membership/process-associates) - [Membership Process for Liaisons](https://www.first.org/membership/process-liaisons) - [Membership Fees](https://www.first.org/membership/#Fees) - [FIRST Teams](https://www.first.org/members/teams/) - [FIRST Associates](https://www.first.org/members/associates/) - [FIRST Liaisons](https://www.first.org/members/liaisons/) - [Members around the world](https://www.first.org/members/map) - [Initiatives](https://www.first.org/global) - [Special Interest Groups (SIGs)](https://www.first.org/global/sigs) - [SIGs Framework](https://www.first.org/global/sigs/framework) - [Academic Security SIG](https://www.first.org/global/sigs/academicsec) - [AI Security SIG](https://www.first.org/global/sigs/ai-security) - [Automation SIG](https://www.first.org/global/sigs/automation) - [Cybersecurity Communications SIG](https://www.first.org/global/sigs/communications/) - [Common Vulnerability Scoring System (CVSS-SIG)](https://www.first.org/cvss) - [Calculator](https://www.first.org/cvss/calculator/4.0) - [Specification Document](https://www.first.org/cvss/v4.0/specification-document) - [User Guide](https://www.first.org/cvss/v4.0/user-guide) - [Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide) - [Examples](https://www.first.org/cvss/v4.0/examples) - [Frequently Asked Questions](https://www.first.org/cvss/v4.0/faq) - [CVSS v4.0 Documentation & Resources](https://www.first.org/cvss/v4.0/) - [CVSS v4.0 Calculator](https://www.first.org/cvss/calculator/4.0) - [CVSS v4.0 Specification Document](https://www.first.org/cvss/v4.0/specification-document) - [CVSS v4.0 User Guide](https://www.first.org/cvss/v4.0/user-guide) - [CVSS v4.0 Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide) - [CVSS v4.0 Examples](https://www.first.org/cvss/v4.0/examples) - [CVSS v4.0 FAQ](https://www.first.org/cvss/v4.0/faq) - [CVSS v3.1 Archive](https://www.first.org/cvss/v3-1) - [CVSS v3.1 Calculator](https://www.first.org/cvss/calculator/3.1) - [CVSS v3.1 Specification Document](https://www.first.org/cvss/v3.1/specification-document) - [CVSS v3.1 User Guide](https://www.first.org/cvss/v3.1/user-guide) - [CVSS v3.1 Examples](https://www.first.org/cvss/v3.1/examples) - [CVSS v3.1 Calculator Use & Design](https://www.first.org/cvss/v3.1/use-design) - [CVSS v3.0 Archive](https://www.first.org/cvss/v3-0) - [CVSS v3.0 Calculator](https://www.first.org/cvss/calculator/3.0) - [CVSS v3.0 Specification Document](https://www.first.org/cvss/v3.0/specification-document) - [CVSS v3.0 User Guide](https://www.first.org/cvss/v3.0/user-guide) - [CVSS v3.0 Examples](https://www.first.org/cvss/v3.0/examples) - [CVSS v3.0 Calculator Use & Design](https://www.first.org/cvss/v3.0/use-design) - [CVSS v2 Archive](https://www.first.org/cvss/v2) - [CVSS v2 Complete Documentation](https://www.first.org/cvss/v2/guide) - [CVSS v2 History](https://www.first.org/cvss/v2/history) - [CVSS-SIG team](https://www.first.org/cvss/v2/team) - [SIG Meetings](https://www.first.org/cvss/v2/meetings) - [Frequently Asked Questions](https://www.first.org/cvss/v2/faq) - [CVSS Adopters](https://www.first.org/cvss/v2/adopters) - [CVSS Links](https://www.first.org/cvss/v2/links) - [CVSS v1 Archive](https://www.first.org/cvss/v1) - [Introduction to CVSS](https://www.first.org/cvss/v1/intro) - [Frequently Asked Questions](https://www.first.org/cvss/v1/faq) - [Complete CVSS v1 Guide](https://www.first.org/cvss/v1/guide) - [JSON & XML Data Representations](https://www.first.org/cvss/data-representations) - [CVSS On-Line Training Course](https://www.first.org/cvss/training) - [Identity & logo usage](https://www.first.org/cvss/identity) - [CSIRT Framework Development SIG](https://www.first.org/global/sigs/csirt) - [Cyber Insurance SIG](https://www.first.org/global/sigs/cyberinsurance) - [Cyber Insurance SIG Webinars](https://www.first.org/global/sigs/cyberinsurance/events) - [Cyber Threat Intelligence SIG](https://www.first.org/global/sigs/cti) - [Curriculum](https://www.first.org/global/sigs/cti/curriculum/) - [Introduction](https://www.first.org/global/sigs/cti/curriculum/introduction) - [Introduction to CTI as a General topic](https://www.first.org/global/sigs/cti/curriculum/cti-introduction) - [Methods and Methodology](https://www.first.org/global/sigs/cti/curriculum/methods-methodology) - [Priority Intelligence Requirement (PIR)](https://www.first.org/global/sigs/cti/curriculum/pir) - [Source Evaluation and Information Reliability](https://www.first.org/global/sigs/cti/curriculum/source-evaluation) - [Machine and Human Analysis Techniques (and Intelligence Cycle)](https://www.first.org/global/sigs/cti/curriculum/machine-human) - [Threat Modelling](https://www.first.org/global/sigs/cti/curriculum/threat-modelling) - [Training](https://www.first.org/global/sigs/cti/curriculum/training) - [Standards](https://www.first.org/global/sigs/cti/curriculum/standards) - [Glossary](https://www.first.org/global/sigs/cti/curriculum/glossary) - [Communicating Uncertainties in CTI Reporting](https://www.first.org/global/sigs/cti/curriculum/cti-reporting/) - [Webinars and Online Training](https://www.first.org/global/sigs/cti/events/) - [Building a CTI program and team](https://www.first.org/global/sigs/cti/cti-program) - [Program maturity stages](https://www.first.org/global/sigs/cti/cti-program/program-stages) - [CTI Maturity model - Stage 1](https://www.first.org/global/sigs/cti/cti-program/stage1) - [CTI Maturity model - Stage 2](https://www.first.org/global/sigs/cti/cti-program/stage2) - [CTI Maturity model - Stage 3](https://www.first.org/global/sigs/cti/cti-program/stage3) - [Program Starter Kit](https://www.first.org/global/sigs/cti/cti-program/starter-kit) - [Resources and supporting materials](https://www.first.org/global/sigs/cti/cti-program/resources) - [Detection Engineering & Threat Hunting SIG](https://www.first.org/global/sigs/de-th/) - [Digital Safety SIG](https://www.first.org/global/sigs/digital-safety) - [DNS Abuse SIG](https://www.first.org/global/sigs/dns) - [Stakeholder Advice](https://www.first.org/global/sigs/dns/stakeholder-advice/) - [Detection]() - [Cache Poisoning](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/cache-poisoning) - [Creation of Malicious Subdomains Under Dynamic DNS Providers](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/creation-of-malicious-subdomains-under-dynamic-dns-providers) - [DGA Domains](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dga) - [DNS As a Vector for DoS](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-as-a-vector-for-dos) - [DNS Beacons - C2 Communication](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-beacons-c2-communication) - [DNS Rebinding](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-rebinding) - [DNS Server Compromise](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-server-compromise) - [DNS Tunneling](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dns-tunneling) - [DoS Against the DNS](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dos-against-the-dns) - [Domain Name Compromise](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/domain-name-compromise) - [Dynamic DNS (as obfuscation technique)](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/dynamic-dns-resolution-as-obfuscation-technique) - [Fast Flux (as obfuscation technique)](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/fast-flux) - [Infiltration and exfiltration via the DNS](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/infiltration-and-exfiltration-via-the-dns) - [Lame Delegations](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/lame-delegations) - [Local Resolver Hijacking](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/local-resolver-hijacking) - [Malicious registration of (effective) second level domains](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/malicious-registration-of-effective-second-level-domains) - [On-path DNS Attack](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/on-path-dns-attack) - [Stub Resolver Hijacking](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/stub-resolver-hijacking) - [Spoofing of a Registered Domain](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/spoofing-of-a-registered-domain) - [Spoofing of Unregistered Domains](https://www.first.org/global/sigs/dns/stakeholder-advice/detection/spoofing-of-unregistered-domains) - [Code of Conduct & Other Policies](https://www.first.org/global/sigs/dns/policies) - [Examples of DNS Abuse](https://www.first.org/global/sigs/dns/dns-abuse-examples) - [Ethics SIG](https://www.first.org/global/sigs/ethics) - [Ethics for Incident Response Teams](https://www.first.org/global/sigs/ethics/ethics-first) - [Exploit Prediction Scoring System (EPSS)](https://www.first.org/epss/) - [The EPSS Model](https://www.first.org/epss/model) - [Data and Statistics](https://www.first.org/epss/data_stats) - [User Guide](https://www.first.org/epss/user-guide) - [EPSS Research and Presentations](https://www.first.org/epss/research) - [Frequently Asked Questions](https://www.first.org/epss/faq) - [Who is using EPSS?](https://www.first.org/epss/who_is_using) - [Open-source EPSS Tools](https://www.first.org/epss/epss_tools) - [API](https://www.first.org/epss/api) - [Related Exploit Research](https://www.first.org/epss/papers) - [Blog]() - [Understanding EPSS Probabilities and Percentiles](https://www.first.org/epss/articles/prob_percentile_bins) - [Log4Shell Use Case](https://www.first.org/epss/articles/log4shell) - [Estimating CVSS v3 Scores for 100,000 Older Vulnerabilities](https://www.first.org/epss/articles/estimating_old_cvss) - [Data Partners](https://www.first.org/epss/partners) - [FIRST Multi-Stakeholder Ransomware SIG](https://www.first.org/global/sigs/msr/) - [Human Factors in Security SIG](https://www.first.org/global/sigs/hfs/) - [Industrial Control Systems SIG (ICS-SIG)](https://www.first.org/global/sigs/ics) - [Information Exchange Policy SIG (IEP-SIG)](https://www.first.org/global/sigs/iep) - [Information Sharing SIG](https://www.first.org/global/sigs/information-sharing) - [Malware Information Sharing Platform](https://www.first.org/global/sigs/information-sharing/misp) - [Law Enforcement SIG](https://www.first.org/global/sigs/le) - [Malware Analysis SIG](https://www.first.org/global/sigs/malware) - [Malware Analysis Framework](https://www.first.org/global/sigs/malware/ma-framework) - [Malware Analysis Tools](https://www.first.org/global/sigs/malware/ma-framework/malwaretools) - [Metrics SIG](https://www.first.org/global/sigs/metrics) - [Metrics SIG Webinars](https://www.first.org/global/sigs/metrics/events) - [NETSEC SIG](https://www.first.org/global/sigs/netsec/) - [Public Policy SIG](https://www.first.org/global/sigs/policy) - [PSIRT SIG](https://www.first.org/global/sigs/psirt) - [Red Team SIG](https://www.first.org/global/sigs/red-team) - [Security Lounge SIG](https://www.first.org/global/sigs/ctf) - [Security Operations Center SIG](https://www.first.org/global/sigs/soc/) - [Strategic Thinking and Planning SIG](https://www.first.org/global/sigs/stp/) - [Threat Intel Coalition SIG](https://www.first.org/global/sigs/tic/) - [Membership Requirements and Veto Rules](https://www.first.org/global/sigs/tic/membership-rules) - [Time SIG](https://www.first.org/global/sigs/time/) - [Traffic Light Protocol (TLP-SIG)](https://www.first.org/global/sigs/tlp) - [Transportation and Mobility SIG](https://www.first.org/global/sigs/transport) - [Vulnerability Coordination](https://www.first.org/global/sigs/vulnerability-coordination) - [Multi-Party Vulnerability Coordination and Disclosure](https://www.first.org/global/sigs/vulnerability-coordination/multiparty) - [Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure](https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines) - [Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)](https://www.first.org/global/sigs/vrdx) - [Vulnerability Database Catalog](https://www.first.org/global/sigs/vrdx/vdb-catalog) - [Women of FIRST](https://www.first.org/global/sigs/wof) - [CCB Initiatives](https://www.first.org/global/ccb-initiatives) - [FIRST CORE](https://www.first.org/global/core) - [Sponsorship Opportunities](https://www.first.org/global/core/sponsorship) - [Internet Governance](https://www.first.org/global/governance) - [IR Database](https://www.first.org/global/irt-database) - [Fellowship Program](https://www.first.org/global/fellowship) - [Application Form](https://portal.first.org/fellowship) - [Mentorship Program](https://www.first.org/global/mentorship) - [IR Hall of Fame](https://www.first.org/hof) - [Hall of Fame Inductees](https://www.first.org/hof/inductees) - [Victim Notification](https://www.first.org/global/victim-notification) - [Volunteers at FIRST](https://www.first.org/volunteers/) - [FIRST Volunteers](https://www.first.org/volunteers/list) - [Member Spotlight](https://www.first.org/global/spotlight) - [Previous Activities](https://www.first.org/cvss/calculator/3-1#new) - [Best Practices Contest](https://www.first.org/global/practices) - [Standards & Publications](https://www.first.org/standards) - [Standards](https://www.first.org/standards) - [Common Vulnerability Scoring System (CVSS-SIG)](https://www.first.org/cvss) - [Traffic Light Protocol (TLP)](https://www.first.org/tlp) - [TLP Use Cases](https://www.first.org/tlp/use-cases) - [Service Frameworks](https://www.first.org/standards/frameworks/) - [CSIRT Services Framework](https://www.first.org/standards/frameworks/csirts) - [PSIRT Services Framework](https://www.first.org/standards/frameworks/psirts) - [Information Exchange Policy (IEP)](https://www.first.org/iep) - [IEP 2.0 Framework](https://www.first.org/iep/iep_framework_2_0) - [IEP 2.0 JSON Specification](https://www.first.org/iep/iep-json-2_0) - [Standard IEP Policies](https://www.first.org/iep/iep-polices) - [IEP TLP Policy File](https://www.first.org/iep/2.0/first-tlp-iep.iepj) - [IEP Unknown Policy File](https://www.first.org/iep/2.0/first-unknown-iep.iepj) - [IEP 1.0 Archive](https://www.first.org/iep/iep_v1_0) - [Passive DNS Exchange](https://www.first.org/global/sigs/passive-dns) - [Exploit Prediction Scoring System (EPSS)](https://www.first.org/epss) - [Publications](https://www.first.org/resources/papers) - [Events](https://www.first.org/events) - [Education](https://www.first.org/education) - [FIRST Training](https://www.first.org/education/first-training) - [Training Courses](https://www.first.org/education/trainings) - [FIRST Trainers](https://www.first.org/education/trainers) - [Blog](https://www.first.org/blog) [JoinDetails about FIRST membership and joining as a full member or liaison.](https://www.first.org/join)[LearnTraining and workshop opportunities, and details about the FIRST learning platform.](https://www.first.org/learn)[ParticipateRead about upcoming events, SIGs, and know what is going on.](https://www.first.org/participate)[CommunityCommunity and Capacity Building.](https://www.first.org/community) This page requires JavaScript. If you have disabled scripting, please enable it. ![CVSS logo](https://www.first.org/cvss/identity/cvss_web.png) # Common Vulnerability Scoring System Version 3.1 Calculator - [Common Vulnerability Scoring System (CVSS-SIG)](https://www.first.org/cvss/) - [Calculator](https://www.first.org/cvss/calculator/4.0) - [Specification Document](https://www.first.org/cvss/v4.0/specification-document) - [User Guide](https://www.first.org/cvss/v4.0/user-guide) - [Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide) - [Examples](https://www.first.org/cvss/v4.0/examples) - [Frequently Asked Questions](https://www.first.org/cvss/v4.0/faq) - [CVSS v4.0 Documentation & Resources](https://www.first.org/cvss/v4.0/) - [CVSS v4.0 Calculator](https://www.first.org/cvss/calculator/4.0) - [CVSS v4.0 Specification Document](https://www.first.org/cvss/v4.0/specification-document) - [CVSS v4.0 User Guide](https://www.first.org/cvss/v4.0/user-guide) - [CVSS v4.0 Implementation Guide](https://www.first.org/cvss/v4.0/implementation-guide) - [CVSS v4.0 Examples](https://www.first.org/cvss/v4.0/examples) - [CVSS v4.0 FAQ](https://www.first.org/cvss/v4.0/faq) - [CVSS v3.1 Archive](https://www.first.org/cvss/v3-1) - [CVSS v3.1 Calculator](https://www.first.org/cvss/calculator/3.1) - [CVSS v3.1 Specification Document](https://www.first.org/cvss/v3.1/specification-document) - [CVSS v3.1 User Guide](https://www.first.org/cvss/v3.1/user-guide) - [CVSS v3.1 Examples](https://www.first.org/cvss/v3.1/examples) - [CVSS v3.1 Calculator Use & Design](https://www.first.org/cvss/v3.1/use-design) - [CVSS v3.0 Archive](https://www.first.org/cvss/v3-0) - [CVSS v3.0 Calculator](https://www.first.org/cvss/calculator/3.0) - [CVSS v3.0 Specification Document](https://www.first.org/cvss/v3.0/specification-document) - [CVSS v3.0 User Guide](https://www.first.org/cvss/v3.0/user-guide) - [CVSS v3.0 Examples](https://www.first.org/cvss/v3.0/examples) - [CVSS v3.0 Calculator Use & Design](https://www.first.org/cvss/v3.0/use-design) - [CVSS v2 Archive](https://www.first.org/cvss/v2) - [CVSS v2 Complete Documentation](https://www.first.org/cvss/v2/guide) - [CVSS v2 History](https://www.first.org/cvss/v2/history) - [CVSS-SIG team](https://www.first.org/cvss/v2/team) - [SIG Meetings](https://www.first.org/cvss/v2/meetings) - [Frequently Asked Questions](https://www.first.org/cvss/v2/faq) - [CVSS Adopters](https://www.first.org/cvss/v2/adopters) - [CVSS Links](https://www.first.org/cvss/v2/links) - [CVSS v1 Archive](https://www.first.org/cvss/v1) - [Introduction to CVSS](https://www.first.org/cvss/v1/intro) - [Frequently Asked Questions](https://www.first.org/cvss/v1/faq) - [Complete CVSS v1 Guide](https://www.first.org/cvss/v1/guide) - [JSON & XML Data Representations](https://www.first.org/cvss/data-representations) - [CVSS On-Line Training Course](https://www.first.org/cvss/training) - [Identity & logo usage](https://www.first.org/cvss/identity) [Copyright](https://www.first.org/copyright) © 2015—2026 by Forum of Incident Response and Security Teams, Inc. All Rights Reserved.
Readable Markdown
Hover over metric group names, metric names and metric values for a summary of the information in the official CVSS v3.1 Specification Document. The Specification is available in the list of links on the left, along with a User Guide providing additional scoring guidance, an Examples document of scored vulnerabilities, and notes on using this calculator (including its design and an XML representation for CVSS v3.1). Base Score ### Attack Vector (AV) Network (N) Adjacent (A) Local (L) Physical (P) ### Attack Complexity (AC) Low (L) High (H) ### Privileges Required (PR) None (N) Low (L) High (H) ### User Interaction (UI) None (N) Required (R) ### Scope (S) Unchanged (U) Changed (C) ### Confidentiality (C) None (N) Low (L) High (H) ### Integrity (I) None (N) Low (L) High (H) ### Availability (A) None (N) Low (L) High (H) Select values for all base metrics to generate score Vector String - select values for all base metrics to generate a vector Temporal Score ### Exploit Code Maturity (E) Not Defined (X) Unproven (U) Proof-of-Concept (P) Functional (F) High (H) ### Remediation Level (RL) Not Defined (X) Official Fix (O) Temporary Fix (T) Workaround (W) Unavailable (U) ### Report Confidence (RC) Not Defined (X) Unknown (U) Reasonable (R) Confirmed (C) Select values for all base metrics to generate score Environmental Score ### Confidentiality Requirement (CR) Not Defined (X) Low (L) Medium (M) High (H) ### Integrity Requirement (IR) Not Defined (X) Low (L) Medium (M) High (H) ### Availability Requirement (AR) Not Defined (X) Low (L) Medium (M) High (H) ### Modified Attack Vector (MAV) Not Defined (X) Network Adjacent Network Local Physical ### Modified Attack Complexity (MAC) Not Defined (X) Low High ### Modified Privileges Required (MPR) Not Defined (X) None Low High ### Modified User Interaction (MUI) Not Defined (X) None Required ### Modified Scope (MS) Not Defined (X) Unchanged Changed ### Modified Confidentiality (MC) Not Defined (X) None Low High ### Modified Integrity (MI) Not Defined (X) None Low High ### Modified Availability (MA) Not Defined (X) None Low High Select values for all base metrics to generate score
Shard189 (laksa)
Root Hash11567983919469339389
Unparsed URLorg,first!www,/cvss/calculator/3-1 s443