CVSSv3 07/31/2018info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1224568.57.39.8
 
 
Apache Camel XSD Validator xml external entity reference0.00CVE-2018-8027
1224557.37.37.4
 
 
Apache Tomcat Native OSCP certificate validation0.03CVE-2018-8020
1224547.37.37.4
 
 
Apache Tomcat Native OSCP Responder certificate validation0.06CVE-2018-8019
1224536.45.37.5
 
 
Huawei Secospace USG9500 Portal Questionnaire memory corruption0.09CVE-2018-7994
1224527.06.37.8
 
 
Huawei Mate 10 Mediaserver use after free0.06CVE-2018-7993
1224515.45.35.5
 
 
Huawei MediaPad M3/Mate 9 Pro/P10 Plus Mdapt Driver memory corruption0.03CVE-2018-7992
1224503.33.33.3
 
 
Huawei Smartphone Interface Location improper authorization0.00CVE-2018-7957
1224493.93.93.9
 
 
Huawei Mobile Phone Debug Mode improper authentication0.03CVE-2018-7947
1224484.43.35.5
 
 
Huawei Mobile Phone Screen Gesture input validation0.00CVE-2018-7934
1224476.45.37.5
 
 
F5 BIG-IP APM URI Parameter information disclosure0.05CVE-2018-5544
1224466.54.38.8
 
 
F5 BIG-IP Controller for Kubernetes Command Line Credentials credentials management0.03CVE-2018-5543
1224454.43.55.4
 
 
IBM Sterling B2B Integrator Standard Edition Web UI cross site scripting0.03CVE-2018-1718
1224447.77.38.1
 
 
IBM API Connect Developer Portal improper authentication0.00CVE-2018-1638
1224436.55.37.8
 
 
Redgate .NET Reflector/SmartAssembly .NET Object input validation0.06CVE-2018-14581
1224426.55.37.8
 
 
Inteno iopsys smb.conf write_tmp access control0.06CVE-2018-14533
1224415.35.35.3
 
 
OpenStack Access Restriction projects information disclosure0.00CVE-2018-14432
1224405.44.36.5
 
 
Foxit Reader out-of-bounds read0.00CVE-2018-14316
1224397.56.38.8
 
 
Foxit Reader use after free0.05CVE-2018-14315
1224387.56.38.8
 
 
Foxit Reader use after free0.00CVE-2018-14314
1224377.56.38.8
 
 
Foxit Reader type conversion0.05CVE-2018-14313
1224367.56.38.8
 
 
Foxit Reader exportAsFDF use after free0.03CVE-2018-14312
1224357.56.38.8
 
 
Foxit Reader XFA Event type conversion0.05CVE-2018-14311
1224347.56.38.8
 
 
Foxit Reader use after free0.06CVE-2018-14310
1224337.56.38.8
 
 
Foxit Reader signatureSetSeedValue use after free0.03CVE-2018-14309
1224327.56.38.8
 
 
Foxit Reader valueAsString use after free0.05CVE-2018-14308
1224317.56.38.8
 
 
Foxit Reader use after free0.00CVE-2018-14307
1224307.56.38.8
 
 
Foxit Reader use after free0.00CVE-2018-14306
1224297.56.38.8
 
 
Foxit Reader use after free0.00CVE-2018-14305
1224287.56.38.8
 
 
Foxit Reader use after free0.05CVE-2018-14304
1224277.56.38.8
 
 
Foxit Reader use after free0.05CVE-2018-14303

Do you need the next level of professionalism?

Upgrade your account now!