CVSSv2 October 2018info

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

PublishedVDBNVDVendResVulnerabilityCTICVE
10/31/20186.84.3
 
 
Green Electronics RainMachine Mini-8/Touch HD 12 Web Application API Page input validation0.01CVE-2018-6909
10/31/20186.85.0
 
 
Green Electronics RainMachine Mini-8/Touch HD 12 Web Application HTTP Header improper authentication0.00CVE-2018-6908
10/31/20184.36.8
 
 
Green Electronics RainMachine Mini-8/Touch HD 12 Web Application REST API cross-site request forgery0.01CVE-2018-6907
10/31/20184.34.3
 
 
Green Electronics RainMachine Mini-8/Touch HD 12 Web Application REST API Persistent cross site scripting0.01CVE-2018-6906
10/31/20186.87.5
 
 
Green Electronics RainMachine Mini-8 Add New Weather Data Source code injection0.01CVE-2018-6012
10/31/20186.86.8
 
 
Green Electronics RainMachine Mini-8 TOTP Hash credentials management0.04CVE-2018-6011
10/31/20186.86.8
 
 
SDL2_image XCF Image memory corruption0.01CVE-2018-3977
10/31/20184.34.3
 
 
Yi Home Camera 27US Phone-to-Camera Communication information disclosure0.01CVE-2018-3947
10/31/20187.55.0
 
 
Yi Home Camera 27US access control0.05CVE-2018-3928
10/31/20185.45.4
 
 
Yi Home Camera 27US OTA Setup command injection0.01CVE-2018-3910
10/31/20186.86.8
 
 
Yi Home Camera 27US QR Code Scanner memory corruption0.05CVE-2018-3900
10/31/20184.04.0
 
 
Microstrategy Web mstrWeb path traversal0.01CVE-2018-18777
10/31/20184.34.3
 
 
Microstrategy Web admin.asp cross site scripting0.05CVE-2018-18776
10/31/20184.34.3
 
 
Microstrategy Web Login.asp cross site scripting0.04CVE-2018-18775
10/31/20184.67.2
 
 
IObit Malware Fighter IOCTL RegFilter.sys memory corruption0.03CVE-2018-18714
10/31/20184.64.6
 
 
M2SOFT Report Designer Viewer MRD File memory corruption0.03CVE-2018-18695
10/31/20183.54.0
 
 
Red Hat GlusterFS resource management0.00CVE-2018-14660
10/31/20186.09.0
 
 
NetGain Enterprise Manager os command injection0.06CVE-2018-10587
10/31/20183.53.5
 
 
NetGain Enterprise Manager Stored cross site scripting0.00CVE-2018-10586
10/31/20185.15.0
 
 
ZTE ZXR10 8905E TCP ISN 7pk security0.00CVE-2018-7356

Do you want to use VulDB in your project?

Use the official API to access entries easily!