CVSSv2 December 2020info

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

PublishedVDBNVDVendResVulnerabilityCTICVE
12/31/20204.9
 
 
 
concread Crate unknown vulnerability0.04CVE-2020-35928
12/31/20204.9
 
 
 
thex Crate Thread unknown vulnerability0.04CVE-2020-35927
12/31/20202.3
 
 
 
nanorand Crate entropy0.06CVE-2020-35926
12/31/20205.2
 
 
 
magnetic Crate Thread MPMCProducer memory corruption0.00CVE-2020-35925
12/31/20204.9
 
 
 
try-mutex Crate Thread unknown vulnerability0.00CVE-2020-35924
12/31/20204.9
 
 
 
ordered-float crate unknown vulnerability0.06CVE-2020-35923
12/31/20205.2
 
 
 
mio Crate SocketAddr memory corruption0.10CVE-2020-35922
12/31/20205.2
 
 
 
miow Crate SocketAddr memory corruption0.00CVE-2020-35921
12/31/20205.2
 
 
 
socket2 Crate SocketAddr memory corruption0.05CVE-2020-35920
12/31/20205.2
 
 
 
net2 Crate SocketAddr memory corruption0.06CVE-2020-35919
12/31/20202.3
 
 
 
branca Crate Token Decoding denial of service0.04CVE-2020-35918
12/31/20204.9
 
 
 
pyo3 Crate use after free0.05CVE-2020-35917
12/31/20204.9
 
 
 
Image Crate unknown vulnerability0.00CVE-2020-35916
12/31/20204.9
 
 
 
futures-intrusive Crate Thread GenericMutexGuard unknown vulnerability0.05CVE-2020-35915
12/31/20204.9
 
 
 
lock_api Crate RwLockWriteGuard unknown vulnerability0.05CVE-2020-35914
12/31/20204.9
 
 
 
lock_api Crate RwLockReadGuard unknown vulnerability0.05CVE-2020-35913
12/31/20204.9
 
 
 
lock_api Crate MappedRwLockWriteGuard unknown vulnerability0.05CVE-2020-35912
12/31/20204.9
 
 
 
lock_api Crate MappedRwLockReadGuard unknown vulnerability0.05CVE-2020-35911
12/31/20204.9
 
 
 
lock_api Crate unknown vulnerability0.05CVE-2020-35910
12/31/20202.3
 
 
 
multihash Crate from_slice denial of service0.07CVE-2020-35909
12/31/20204.9
 
 
 
futures-util Crate FuturesUnordered unknown vulnerability0.05CVE-2020-35908
12/31/20202.3
 
 
 
futures-task Crate noop_waker_ref null pointer dereference0.05CVE-2020-35907
12/31/20204.9
 
 
 
futures-task Crate waker use after free0.05CVE-2020-35906
12/31/20204.9
 
 
 
futures-util Crate map race condition0.05CVE-2020-35905
12/31/20205.2
 
 
 
crossbeam-channel Crate memory corruption0.07CVE-2020-35904
12/31/20204.9
 
 
 
dync Crate VecCopy unknown vulnerability0.05CVE-2020-35903
12/31/20204.9
 
 
 
actix-codec Crate Framed use after free0.05CVE-2020-35902
12/31/20204.9
 
 
 
actix-http Crate BodyStream use after free0.05CVE-2020-35901
12/31/20204.9
 
 
 
array-queue Crate pop_back use after free0.10CVE-2020-35900
12/31/20204.9
 
 
 
actix-service Crate Cell unknown vulnerability0.05CVE-2020-35899
12/31/20204.9
 
 
 
actix-utils Crate Cell unknown vulnerability0.05CVE-2020-35898
12/31/20204.9
 
 
 
atom Crate Send unknown vulnerability0.06CVE-2020-35897
12/31/20206.5
 
 
 
ws Crate buffer overflow0.06CVE-2020-35896
12/31/20205.2
 
 
 
stack Crate ArrayVec out-of-bounds write0.09CVE-2020-35895
12/31/20205.2
 
 
 
obstack Crate unknown vulnerability0.09CVE-2020-35894
12/31/20204.9
 
 
 
simple-slab Crate remove uninitialized pointer0.34CVE-2020-35893
12/31/20202.3
 
 
 
simple-slab Crate index out-of-bounds read0.05CVE-2020-35892
12/31/20204.9
 
 
 
ordnung Crate Vec double free0.09CVE-2020-35891
12/31/20202.3
 
 
 
ordnung Crate Vec out-of-bounds read0.04CVE-2020-35890
12/31/20204.9
 
 
 
crayon Crate HandleLike toctou0.12CVE-2020-35889

Do you want to use VulDB in your project?

Use the official API to access entries easily!