CVSSv3 03/08/2018info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1142478.57.39.8
 
 
Zoho ManageEngine Applications Manager testCredential.do command injection0.08CVE-2018-7890
1142467.06.37.8
 
 
calibre Bookmark Import bookmarkmanager.py cPickle.load deserialization0.04CVE-2018-7889
1142456.46.36.5
 
 
libming Double Data decompile.c getString memory corruption0.00CVE-2018-7877
1142445.95.36.5
 
 
libming parser.c parseSWF_ACTIONRECORD resource management0.00CVE-2018-7876
1142436.46.36.5
 
 
libming CONSTANT8 Data decompile.c getString memory corruption0.00CVE-2018-7875
1142425.44.36.5
 
 
libming decompile.c strlenext memory corruption0.00CVE-2018-7874
1142416.46.36.5
 
 
libming Integer Data decompile.c getString memory corruption0.00CVE-2018-7873
1142405.44.36.5
 
 
libming CONSTANT16 Data getName memory corruption0.00CVE-2018-7872
1142397.56.38.8
 
 
libming CONSTANT16 Data decompile.c getName memory corruption0.00CVE-2018-7871
1142385.44.36.5
 
 
libming CONSTANT16 Data decompile.c memory corruption0.00CVE-2018-7870
1142376.45.37.5
 
 
libming decompile.c dcinit resource management0.00CVE-2018-7869
1142366.46.36.5
 
 
libming CONSTANT8 Data decompile.c getName memory corruption0.05CVE-2018-7868
1142356.46.36.5
 
 
libming decompile.c getString memory corruption0.00CVE-2018-7867
1142345.44.36.5
 
 
newVar3 decompile.c null pointer dereference0.00CVE-2018-7866
1142334.43.35.5
 
 
Linux Kernel sas_expander.c sas_smp_get_phy_events resource management0.00CVE-2018-7757
1142324.43.35.5
 
 
Linux Kernel Floppy Driver floppy.c fd_locked_ioctl information disclosure0.00CVE-2018-7755
1142318.16.59.8
 
 
ntp Symmetric Mode decodearr memory corruption0.05CVE-2018-7183
1142306.55.37.8
 
 
Rapid Scada Access Control SCADA permission0.00CVE-2018-5313
1142297.47.37.5
 
 
Siemens EN100 Ethernet Module Firmware access control0.05CVE-2018-4840
1142285.15.05.3
 
 
Siemens EN100 Ethernet Module improper authorization0.05CVE-2018-4839
1142277.47.37.5
 
 
Siemens EN100 Ethernet Module Web Interface access control0.00CVE-2018-4838
1142265.65.35.9
 
 
IBM SAML-based Single Sign-On XML Parser improper authentication0.00CVE-2018-1443
1142256.54.38.8
 
 
IBM Application Performance Management Response Time Monitoring Agent cross-site request forgery0.09CVE-2018-1442
1142245.35.35.3
 
 
IBM Application Performance Management for Monitoring information disclosure0.07CVE-2018-1387
1142235.75.36.1
 
 
EMC RSA Archer QuickLinks redirect0.00CVE-2018-1220
1142224.34.34.3
 
 
EMC RSA Archer API information disclosure0.00CVE-2018-1219
1142219.89.89.8
 
 
Dell EMC Unisphere for VMAX Web User Interface hard-coded credentials0.00CVE-2018-1216
1142207.56.38.8
 
 
Dell EMC Unisphere for VMAX vApp Manager unrestricted upload0.00CVE-2018-1215
1142197.87.87.8
 
 
EMC RSA Identity Governance access control0.00CVE-2018-1182
1142187.37.86.7
 
 
Cisco StarOS CLI command injection0.00CVE-2018-0224

Do you want to use VulDB in your project?

Use the official API to access entries easily!