CVSSv3 04/25/2017info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1008546.36.3
 
 
 
Microsoft Windows RRAS ERRATICGOPHER memory corruption
1007275.64.76.16.1
 
HPE OpenCall Media Platform Reflected cross site scriptingCVE-2017-5798
1007267.16.38.86.3
 
HPE OpenCall Media Platform privilege escalationCVE-2017-5799
1006218.57.39.8
 
 
Adobe ColdFusion Apache BlazeDS Library Deserialization privilege escalationCVE-2017-3066
1006205.75.36.1
 
 
Adobe ColdFusion cross site scriptingCVE-2017-3008
1006087.55.39.8
 
 
Wireless IP Camera WIFICAM ini File information disclosureCVE-2017-8225
1006078.57.39.8
 
 
Wireless IP Camera WIFICAM Telnet Backdoor weak authenticationCVE-2017-8224
1006066.45.37.5
 
 
Wireless IP Camera WIFICAM RTSP Server weak authenticationCVE-2017-8223
1006055.74.07.5
 
 
Wireless IP Camera WIFICAM Certificate ck.pem information disclosureCVE-2017-8222
1006045.63.77.5
 
 
Wireless IP Camera WIFICAM Cloud Feature Cleartext weak encryptionCVE-2017-8221
1006038.16.39.9
 
 
TP-LINK C2/C20i HTTP Request Command privilege escalationCVE-2017-8220
1006025.44.36.5
 
 
TP-LINK C2/C20i HTTP Server ansi denial of serviceCVE-2017-8219
1006018.57.39.8
 
 
TP-LINK C2/C20i vsftpd Backdoor weak authenticationCVE-2017-8218
1006006.37.35.3
 
 
TP-LINK C2/C20i iptables privilege escalationCVE-2017-8217
1005995.96.55.3
 
 
MODX Revolution Search Page url_search.php directory traversalCVE-2017-8115
1005985.35.35.3
 
 
Joomla CMS Error Reporting Path information disclosureCVE-2017-8057
1005976.46.36.5
 
 
Joomla CMS MIME Type privilege escalationCVE-2017-7989
1005965.96.55.3
 
 
Joomla CMS Filter privilege escalationCVE-2017-7988
1005955.24.36.1
 
 
Joomla CMS Template Manager cross site scriptingCVE-2017-7987
1005945.24.36.1
 
 
Joomla CMS Filter cross site scriptingCVE-2017-7986

Do you want to use VulDB in your project?

Use the official API to access entries easily!