CVSSv3 January 2018info

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

C3BM Index »

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

PublishedBaseVDBNVDVendResVulnerabilityCTICVE
01/31/20186.36.3
 
 
 
uTorrent Guest Account privileges management0.08
01/31/20185.05.0
 
 
 
uTorrent PRNG improper authentication0.08
01/31/20185.05.0
 
 
 
uTorrent memory corruption0.08
01/31/20186.36.3
 
 
 
uTorrent JSON RPC Server privileges management0.05
01/31/20186.36.3
 
 
 
uTorrent Web HTTP RPC Server privileges management0.17
01/31/20187.56.38.8
 
 
CCN-lite Nonce type conversion0.05CVE-2018-6480
01/31/20187.57.57.5
 
 
Netwave IP Camera POST Request resource management0.05CVE-2018-6479
01/31/20189.89.89.8
 
 
SUPERAntiSpyware Professional Trial Driver SASKUTIL.SYS input validation0.09CVE-2018-6476
01/31/20186.55.37.8
 
 
SUPERAntiSpyware Professional Trial DLL SUPERAntiSpyware.exe untrusted search path0.05CVE-2018-6475
01/31/20187.26.67.8
 
 
SUPERAntiSpyware Professional Trial Driver SASKUTIL.SYS input validation0.17CVE-2018-6474
01/31/20187.26.67.8
 
 
SUPERAntiSpyware Professional Trial Driver SASKUTIL.SYS input validation0.08CVE-2018-6473
01/31/20187.26.67.8
 
 
SUPERAntiSpyware Professional Trial Driver SASKUTIL.SYS input validation0.05CVE-2018-6472
01/31/20187.26.67.8
 
 
SUPERAntiSpyware Professional Trial Driver SASKUTIL.SYS input validation0.17CVE-2018-6471
01/31/20185.24.36.1
 
 
PropertyHive Plugin html-preview-applicant-matches-email.php cross site scripting0.17CVE-2018-6465
01/31/20185.24.36.1
 
 
Simditor TEXTAREA cross site scripting0.17CVE-2018-6464
01/31/20187.06.37.8
 
 
Tracker PDF-XChange YCC to RGB data processing0.10CVE-2018-6462
01/31/20186.45.37.5
 
 
Hotspot Shield Web Server status.js information disclosure0.17CVE-2018-6460
01/31/20186.45.37.5
 
 
Linux Kernel sbuslib.c sbusfb_ioctl_helper information disclosure0.17CVE-2018-6412
01/31/20186.55.37.8
 
 
NSClient++ program.exe unquoted search path0.06CVE-2018-6384
01/31/20186.97.36.5
 
 
Pulse Secure Desktop Client GUI certificate validation0.06CVE-2018-6374
01/31/20187.57.37.8
 
 
7-zip/p7zip PPMd Code 7pk error0.06CVE-2018-5996
01/31/20188.57.39.8
 
 
Iolo System Shield AntiVirus/AntiSpyware Driver amp.sys File memory corruption0.17CVE-2018-5701
01/31/20186.95.38.6
 
 
Cisco IOS XR IPv6 Subsystem input validation0.17CVE-2018-0136
01/31/20186.55.37.8
 
 
Center for Internet Security CIS-CAT Pro Dashboard Forgot Password password recovery0.07CVE-2017-8916
01/31/20184.43.35.5
 
 
QEMU ROUND_UP integer overflow0.17CVE-2017-18043
01/31/20184.75.44.0
 
 
IBM DataPower Gateways DNS Cache insufficient verification of data authenticity0.17CVE-2017-1773
01/31/20187.87.8
 
 
 
Arq standardrestorer access control0.04CVE-2017-16945
01/31/20187.87.87.8
 
 
Arq URL arq_updater access control0.09CVE-2017-16928
01/31/20184.83.75.9
 
 
Linux Kernel stub_tx.c stub_send_ret_submit null pointer dereference0.09CVE-2017-16914
01/31/20184.83.75.9
 
 
Linux Kernel stub_rx.c stub_recv_cmd_submit memory corruption0.08CVE-2017-16913

Do you want to use VulDB in your project?

Use the official API to access entries easily!