How the vulnerability is exploited
Conditions beyond the attacker's control
Level of privileges needed
Does a user need to interact?
Can impact extend beyond the vulnerable component?
Impact to information confidentiality
Impact to information integrity
Impact to resource availability
Select all metrics to calculate the CVSS score
8 of 8 remaining
Click to load example vectors
This calculator implements the CVSS v3.1 specification by FIRST.org. All calculations are performed client-side — no data leaves your browser.