CVSSv3 03/15/2018

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1147598.57.39.8
 
 
MikroTik RouterOS SMB memory corruption0.07CVE-2018-7445
1146805.75.36.1
 
 
Activity Log Plugin cross site scripting0.00CVE-2018-8729
1146795.24.36.1
 
 
Kontena code.html cross site scripting0.00CVE-2018-8728
1146784.43.55.4
 
 
ServiceNow ITSM My Profile/My Portal navpage.do cross site scripting0.06CVE-2018-8720
1146778.57.39.8
 
 
SchedMD Slurm sql injection0.00CVE-2018-7033
1146764.23.15.3
 
 
VMware Workstation/Fusion VNC Session resource management0.00CVE-2018-6957
1146758.57.39.8
 
 
Trend Micro Smart Protection Server AUTH Command command injection0.04CVE-2018-6231
1146745.74.76.8
 
 
Trend Micro Email Encryption Gateway sql injection0.00CVE-2018-6230
1146738.57.39.8
 
 
Trend Micro Email Encryption Gateway sql injection0.00CVE-2018-6229
1146728.57.39.8
 
 
Trend Micro Email Encryption Gateway sql injection0.00CVE-2018-6228
1146714.43.55.4
 
 
Trend Micro Email Encryption Gateway Stored cross site scripting0.00CVE-2018-6227
1146704.43.55.4
 
 
Trend Micro Email Encryption Gateway Reflected cross site scripting0.00CVE-2018-6226
1146695.36.34.3
 
 
Trend Micro Email Encryption Gateway xml external entity reference0.00CVE-2018-6225
1146686.54.38.8
 
 
Trend Micro Email Encryption Gateway cross-site request forgery0.00CVE-2018-6224
1146678.57.39.8
 
 
Trend Micro Email Encryption Gateway improper authentication0.00CVE-2018-6223
1146666.55.37.8
 
 
Trend Micro Email Encryption Gateway access control0.00CVE-2018-6222
1146656.85.68.1
 
 
Trend Micro Email Encryption Gateway Software Update certificate validation0.00CVE-2018-6221
1146648.57.39.8
 
 
Trend Micro Email Encryption Gateway injection0.00CVE-2018-6220
1146636.97.36.5
 
 
Trend Micro Email Encryption Gateway Update certificate validation0.00CVE-2018-6219
1146626.55.37.8
 
 
Delta Electronics Delta Industrial Automation DOPSoft dpb File memory corruption0.00CVE-2018-5476

Do you want to use VulDB in your project?

Use the official API to access entries easily!