CVSSv3 May 2017info

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

C3BM Index »

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

PublishedBaseVDBNVDVendResVulnerabilityCTICVE
05/31/20175.24.05.56.2
 
IBM Spectrum Protect Registry Password information disclosure0.03CVE-2016-8939
05/31/20177.15.69.85.9
 
IBM Domino TLS Server input validation0.00CVE-2016-6087
05/31/20176.55.67.5
 
 
Red Hat CloudForms CA certificate validation0.00CVE-2017-2639
05/31/20176.55.67.5
 
 
Red Hat CloudForms SSL/TLS Certificate cryptographic issues0.04CVE-2016-4457
05/31/20175.44.26.7
 
 
Intel Solid State Drive Toolbox access control0.06CVE-2017-5688
05/31/20175.95.46.5
 
 
Allen Disk remotedownload.php server-side request forgery0.00CVE-2017-9307
05/31/20175.24.36.1
 
 
sysPass XSS Filter Html.class.php cross site scripting0.02CVE-2017-9306
05/31/20175.24.36.1
 
 
Tiki Wiki CMS Groupware XSS Filter PreventXss.php Padding cross site scripting0.06CVE-2017-9305
05/31/20176.45.37.5
 
 
YARA Regex re.c _yr_re_emit recursion0.03CVE-2017-9304
05/31/20177.56.38.8
 
 
PivotX .htaccess code injection0.04CVE-2017-8402
05/30/20177.17.86.4
 
 
Todd Miller sudo TTY get_process_ttyname race condition0.05CVE-2017-1000367
05/30/20174.43.35.5
 
 
Poppler pdfunite null pointer dereference1.14CVE-2017-7511
05/30/20176.45.37.5
 
 
NSS SSLv2 Message null pointer dereference0.91CVE-2017-7502
05/30/20175.35.35.3
 
 
Juniper Junos Space 7pk security0.05CVE-2017-2311
05/30/20176.37.35.3
 
 
Juniper Junos Space Firewall access control0.03CVE-2017-2310
05/30/20175.65.35.9
 
 
Juniper Junos Space Certificate Authentication information disclosure0.00CVE-2017-2309
05/30/20175.44.36.5
 
 
Juniper Junos Space xml external entity reference0.75CVE-2017-2308
05/30/20175.24.36.1
 
 
Juniper Junos Space Administrative Interface Reflected cross site scripting0.66CVE-2017-2307
05/30/20177.56.38.8
 
 
Juniper Junos Space Administrative Web Interface authorization0.66CVE-2017-2306
05/30/20177.56.38.8
 
 
Juniper Junos Space Administrative Web Interface authorization0.75CVE-2017-2305

Want to stay up to date on a daily basis?

Enable the mail alert feature now!