CVSSv3 03/07/2018info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1141888.57.39.8
 
 
Bleach Attribute input validation0.00CVE-2018-7753
1141876.55.37.8
 
 
GPAC av_parsers.c gf_media_avc_read_sps memory corruption0.00CVE-2018-7752
1141866.54.38.8
 
 
Western Bridge Cobub Razor Stored cross site scripting0.00CVE-2018-7746
1141857.47.37.5
 
 
Western Bridge Cobub Razor access control0.06CVE-2018-7745
1141845.86.35.3
 
 
NetIQ SENTINEL Web Interface information disclosure0.05CVE-2018-7675
1141836.54.38.8
 
 
Polycom QDX 6000 cross-site request forgery0.04CVE-2018-7565
1141825.24.36.1
 
 
Polycom QDX 6000 Stored cross site scripting0.00CVE-2018-7564
1141816.77.36.1
 
 
SO Connect SO WIFI Hotspot Web Interface redirect0.00CVE-2018-7473
1141806.45.37.5
 
 
Giribaz File Manager Plugin logger.php Credentials credentials management0.03CVE-2018-7204
1141797.47.37.5
 
 
Emerson ControlWave Micro memory corruption0.00CVE-2018-5452
1141786.45.37.5
 
 
389-ds-base LDAP Search Filter out-of-bounds read0.00CVE-2018-1054
1141775.14.35.9
 
 
Sinatra rack-protection information disclosure0.05CVE-2018-1000119
1141767.56.38.8
 
 
GitHub Electron Protocol os command injection0.00CVE-2018-1000118
1141755.44.26.7
 
 
Python Software Foundation CPython os.symlink memory corruption0.05CVE-2018-1000117
1141748.57.39.8
 
 
net-snmp UDP Protocol memory corruption0.06CVE-2018-1000116
1141738.57.39.8
 
 
Bacula-Web sql injection0.09CVE-2017-15367
1141727.88.17.5
 
 
Artemis/HornetQ UDP Discovery resource consumption0.00CVE-2017-12174
1141714.43.55.4
 
 
Jease cross site scripting0.00CVE-2014-8780
1141695.24.36.1
 
 
Eramba Date Filter crons Reflected cross site scripting0.00CVE-2018-7741
1141684.43.35.5
 
 
Linux Kernel hugetlb.c resv_map_release memory corruption0.00CVE-2018-7740
1141675.24.36.1
 
 
MetInfo index.php cross site scripting0.00CVE-2018-7721
1141666.54.38.8
 
 
Western Bridge Cobub Razor cross-site request forgery0.00CVE-2018-7720
1141654.43.35.5
 
 
Linux Kernel mlock.c __munlock_pagevec input validation0.05CVE-2017-18221
1141648.57.39.8
 
 
antsle antman Web Management Console login ProcessBuilder access control0.00CVE-2018-7739
1141636.55.37.8
 
 
util-linux access control0.00CVE-2018-7738
1141625.75.36.1
 
 
DrayTek Vigor AP910C home.asp cross site scripting0.06CVE-2017-11650
1141617.05.38.8
 
 
DrayTek Vigor AP910C cross-site request forgery0.00CVE-2017-11649
1141608.57.39.8
 
 
Exponent CMS Upload unrestricted upload0.06CVE-2016-7443
1141598.57.39.8
 
 
Google Chrome OS Boot memory corruption0.07CVE-2016-5179

Do you want to use VulDB in your project?

Use the official API to access entries easily!