CVSSv2 January 2019info

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

PublishedVDBNVDVendResVulnerabilityCTICVE
01/31/20197.510.0
 
 
D-Link DIR-823G HNAP1 GetNetworkTomographyResult os command injection0.05CVE-2019-7297
01/31/20194.34.3
 
 
typora Formula Rendering cross site scripting0.01CVE-2019-7296
01/31/20194.34.3
 
 
typora Formula Rendering cross site scripting0.01CVE-2019-7295
01/31/20194.05.8
 
 
netkit rcp input validation0.03CVE-2019-7283
01/31/20196.84.3
 
 
netkit Access Restriction rcp.c access control0.08CVE-2019-7282
01/31/20194.34.3
 
 
Cross Reference Add-on Preview Box Stored cross site scripting0.05CVE-2019-7250
01/31/20197.57.5
 
 
Keybase RPC access control0.01CVE-2019-7249
01/31/20196.86.8
 
 
FileChucker Upload Filter filechucker.cgi input validation0.08CVE-2019-7216
01/31/20197.57.5
 
 
SchedMD Slurm access control0.06CVE-2019-6438
01/31/20194.05.8
 
 
OpenSSH scp input validation0.21CVE-2019-6111
01/31/20195.14.0
 
 
OpenSSH access control0.00CVE-2019-6110
01/31/20195.14.0
 
 
OpenSSH Encoding progressmeter.c refresh_progress_meter access control0.00CVE-2019-6109
01/31/20194.34.3
 
 
IBM Navigator for i Web UI cross site scripting0.01CVE-2019-4040
01/31/20194.67.2
 
 
Google Android NVIDIA Tegra Gralloc Module access control0.07CVE-2018-6241
01/31/20196.85.0
 
 
Practecol Guardzilla All-In-One Video Security System Cloud-based Storage hard-coded credentials0.04CVE-2018-5560
01/31/20197.55.0
 
 
Media File Manager Plugin admin-ajax.php path traversal0.04CVE-2018-19043
01/31/20197.55.0
 
 
Media File Manager Plugin admin-ajax.php dir_to path traversal0.01CVE-2018-19042
01/31/20194.34.3
 
 
Media File Manager Plugin admin-ajax.php mrelocator_getdir cross site scripting0.12CVE-2018-19041
01/31/20197.55.0
 
 
Media File Manager Plugin admin-ajax.php mrelocator_getdir path traversal0.04CVE-2018-19040
01/31/20194.35.0
 
 
Vignette Content Management HTML Source Code Password credentials management0.05CVE-2018-18941
01/31/20194.34.3
 
 
Netscape Enterprise SnoopServlet Reflected cross site scripting0.01CVE-2018-18940
01/31/20192.93.3
 
 
CMS-770 improper authentication0.04CVE-2018-17928
01/31/20195.43.3
 
 
M2M Ethernet FW/Ethernet ETH-FW File Upload improper authentication0.01CVE-2018-17926
01/31/20197.55.0
 
 
D-Link Central WiFiManager CWM-100 MailConnect server-side request forgery0.03CVE-2018-15517
01/31/20196.03.5
 
 
D-Link Central WiFiManager CWM-100 Service Port 8000 server-side request forgery0.04CVE-2018-15516
01/31/20196.67.2
 
 
D-Link Central WiFiManager CWM-100 CaptivelPortal Service CaptivelPortal.exe access control0.00CVE-2018-15515
01/31/20197.57.5
 
 
OpenJDK/Eclipse OpenJ9 jdk.crypto.jniprovider.NativeCrypto memory corruption0.03CVE-2018-12548
01/31/20196.84.6
 
 
Apache Open Office Document Loader calculation0.09CVE-2018-11790
01/31/20194.94.9
 
 
Linux Kernel io_ti.c change_port_settings divide by zero0.06CVE-2017-18360
01/30/20197.55.0
 
 
idreamsoft iCMS editor.admincp.php path traversal0.06CVE-2019-7237

Do you need the next level of professionalism?

Upgrade your account now!