CVSSv3 07/09/2018info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1210675.95.46.5
 
 
Apple Safari WebKit Page Loading input validation0.00CVE-2018-4260
1210666.45.47.5
 
 
Apple Safari WebKit input validation0.00CVE-2018-4274
1210656.46.36.5
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4273
1210646.46.36.5
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4271
1210637.56.38.8
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4272
1210627.56.38.8
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4267
1210617.56.38.8
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4265
1210607.56.38.8
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4264
1210597.56.38.8
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4263
1210587.56.38.8
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4262
1210577.56.38.8
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4261
1210565.14.35.9
 
 
Apple Safari WebKit race condition0.00CVE-2018-4266
1210557.56.38.8
 
 
Apple Safari WebKit type conversion0.00CVE-2018-4284
1210544.34.34.3
 
 
Apple Safari WebKit 7pk security0.00CVE-2018-4278
1210536.46.36.5
 
 
Apple Safari WebKit memory corruption0.00CVE-2018-4270
1210525.45.45.3
 
 
Apple Safari input validation0.00CVE-2018-4279
1210517.06.57.5
 
 
Apple macOS LinkPresentation input validation0.03CVE-2018-4277
1210507.47.37.5
 
 
Apple macOS libxpc out-of-bounds read0.00CVE-2018-4248
1210496.55.37.8
 
 
Apple macOS libxpc memory corruption0.00CVE-2018-4280
1210485.65.65.6
 
 
Apple macOS Kernel information disclosure0.03CVE-2018-3665
1210475.45.35.5
 
 
Apple macOS IOGraphics out-of-bounds read0.00CVE-2018-4283
1210465.45.35.5
 
 
Apple macOS DesktopServices permission0.03CVE-2018-4178
1210457.36.18.6
 
 
Apple macOS CoreCrypto memory corruption0.05CVE-2018-4269
1210444.84.35.3
 
 
Apple macOS CFNetwork input validation0.00CVE-2018-4293
1210436.55.37.8
 
 
Apple macOS ATS type conversion0.00CVE-2018-4285
1210428.57.39.8
 
 
Apple macOS APFS memory corruption0.00CVE-2018-4268
1210414.94.35.5
 
 
Apple macOS AMD information disclosure0.00CVE-2018-4289
1210406.46.36.5
 
 
Apple watchOS WebKit memory corruption0.00CVE-2018-4273
1210396.46.36.5
 
 
Apple watchOS WebKit memory corruption0.00CVE-2018-4271
1210387.56.38.8
 
 
Apple watchOS WebKit memory corruption0.03CVE-2018-4272

Do you need the next level of professionalism?

Upgrade your account now!