CVSSv3 06/07/2017info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1021586.05.35.96.8
 
Cisco IP Phone 8800 SIP Service input validation0.00CVE-2017-6656
1021575.85.36.16.1
 
Cisco Email Security Appliance Message Tracking cross site scripting0.00CVE-2017-6661
1021566.97.37.55.8
 
Cisco Email Security Appliance MIME Header input validation0.00CVE-2017-6671
1021556.86.56.57.4
 
Cisco NX-OS Fibre Channel over Ethernet Frame memory corruption0.00CVE-2017-6655
1021545.13.26.06.0
 
Cisco IOS XR resource management0.00CVE-2017-6666
1020867.27.17.4
 
 
SubSonic Playlist server-side request forgery0.03CVE-2017-9355
1020857.56.38.8
 
 
Schneider Electric SoMachine HVAC DLL Loader access control0.00CVE-2017-7966
1020846.04.87.3
 
 
Schneider Electric SoMachine HVAC AlTracePrint.exe memory corruption0.00CVE-2017-7965
1020835.75.85.5
 
 
VMware ESXi/Workstation Pro/Player/Fusion Pro/Fusion information disclosure0.00CVE-2017-4905
1020829.39.88.8
 
 
VMware ESXi/Workstation Pro/Player/Fusion Pro/Fusion XHCI Controller memory corruption0.00CVE-2017-4904
1020819.410.08.8
 
 
VMware ESXi/Workstation Pro/Player/Fusion Pro/Fusion SVGA memory corruption0.07CVE-2017-4903
1020809.410.08.8
 
 
VMware ESXi/Workstation Pro/Player/Fusion Pro/Fusion SVGA memory corruption0.00CVE-2017-4902
1020796.55.37.8
 
 
GCC for Stack Smashing Protection libssp memory corruption0.00CVE-2016-4973
1020785.95.36.5
 
 
libdwarf dwarf_leb.c input validation0.03CVE-2015-8538
1020777.06.57.5
 
 
Spiffy path traversal0.03CVE-2015-8235
1020768.57.39.8
 
 
ZCMS sql injection0.03CVE-2015-7346
1020754.43.55.4
 
 
Vindula cross site scripting0.05CVE-2015-6959
1020745.24.36.1
 
 
Intellect Design Arena Core Banking cross site scripting0.05CVE-2015-6540
1020735.94.07.8
 
 
Ansible chroot/jail/Zone Connection link following0.00CVE-2015-6240
1020728.18.18.1
 
 
opa-fm/opa-ff race condition0.05CVE-2015-5232

Interested in the pricing of exploits?

See the underground prices here!