CVSSv3 09/14/2017info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1067448.06.39.8
 
 
Microsoft Edge Chakra Javascript Engine memory corruptionCVE-2017-11767
1067196.55.37.8
 
 
Ansible Vault yaml Loader privilege escalationCVE-2017-2809
1067184.23.15.3
 
 
IBM Jazz Reporting Service Lifecycle Query Engine information disclosureCVE-2017-1490
1067177.56.38.8
 
 
GNU Emacs Email enriched.el privilege escalationCVE-2017-14482
1067165.44.36.5
 
 
Fastly CDN Module information disclosureCVE-2017-13761
1067158.57.39.8
 
 
QNAP QTS Media Library privilege escalationCVE-2017-13067
1067146.45.37.5
 
 
Pagure information disclosureCVE-2017-1002151
1067136.26.36.1
 
 
python-fedora CSRF Protection Open RedirectCVE-2017-1002150
1067126.46.36.5
 
 
Azure Kubernetes URI Persistent privilege escalationCVE-2017-1002100
1067118.57.39.8
 
 
wordpress-gallery-transformation gallery.php sql injectionCVE-2017-1002028
1067108.57.39.8
 
 
rk-responsive-contact-form rk_user_list.php sql injectionCVE-2017-1002027
1067097.56.38.8
 
 
Event Expresso Free edit_event_category sql injectionCVE-2017-1002026
1067085.94.77.2
 
 
plugin add-edit-delete-listing-for-member-module sql injectionCVE-2017-1002025
1067075.36.34.3
 
 
Kind Editor File Upload upload_json.php privilege escalationCVE-2017-1002024
1067068.57.39.8
 
 
Easy Team Manager easy_team_manager_desc_edit.php sql injectionCVE-2017-1002023
1067058.57.39.8
 
 
surveys Plugin questions.php sql injectionCVE-2017-1002022
1067048.57.39.8
 
 
surveys Plugin individual_responses.php sql injectionCVE-2017-1002021
1067038.57.39.8
 
 
surveys Plugin survey_form.php sql injectionCVE-2017-1002020
1067028.57.39.8
 
 
eventr Plugin edit.php Blind sql injectionCVE-2017-1002019
1067018.57.39.8
 
 
eventr Plugin edit.php Blind sql injectionCVE-2017-1002018

Want to stay up to date on a daily basis?

Enable the mail alert feature now!