CVSSv3 08/22/2018info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1231456.85.68.1
 
 
Apache Struts Namespace Remote Code Execution0.00CVE-2018-11776
1231516.55.37.8
 
 
Norton Power Eraser/SymDiag DLL Loader privilege escalation0.00CVE-2018-5238
1231505.65.36.0
 
 
Norton Utilities DLL Loader privilege escalation0.00CVE-2018-5235
1231496.36.36.2
 
 
Philips PageWriter privilege escalation0.00CVE-2018-14801
1231483.73.73.7
 
 
Philips PageWriter memory corruption0.00CVE-2018-14799
1231475.44.26.7
 
 
Philips IntelliSpace Cardiovascular/Xcelera Unquoted Search Path privilege escalation0.00CVE-2018-14789
1231467.87.87.8
 
 
Philips IntelliSpace Cardiovascular Folder privilege escalation0.00CVE-2018-14787
1231447.26.38.1
 
 
Apache Cayenne CayenneModeler File Transfer privilege escalation0.00CVE-2018-11758
1231435.44.36.5
 
 
Samba LDAP Server denial of service0.00CVE-2018-1140
1231426.85.68.1
 
 
Samba NTLMv1 Authentication Man-in-the-Middle weak authentication0.00CVE-2018-1139
1231415.44.36.5
 
 
Samba Active Directory LDAP Server information disclosure0.00CVE-2018-10919
1231405.44.36.5
 
 
Samba Active Directory Domain Controller NULL Pointer Dereference denial of service0.00CVE-2018-10918
1231396.54.38.8
 
 
Ansible Tower authentication.py cross site request forgery0.08CVE-2018-10884
1231387.56.38.8
 
 
Samba File Name Heap-based memory corruption0.00CVE-2018-10858
1231375.45.35.6
 
 
GnuTLS Lucky Thirteen weak encryption0.00CVE-2018-10846
1231365.75.65.9
 
 
GnuTLS HMAC-SHA-384 Lucky Thirteen weak encryption0.00CVE-2018-10845
1231355.75.65.9
 
 
GnuTLS HMAC-SHA-256 Lucky Thirteen weak encryption0.00CVE-2018-10844
1231346.46.36.5
 
 
Red Hat CloudForms Management Engine Header CRLF privilege escalation0.00CVE-2017-7528
1231335.55.65.4
 
 
Satellite X.509 Certificate Man-in-the-Middle weak authentication0.00CVE-2017-7513
1231325.36.34.3
 
 
Foreman Katello Plugin Filter privilege escalation0.00CVE-2017-2662
1231315.44.36.5
 
 
libvirt Drive Crash denial of service0.00CVE-2017-2635
1231308.58.88.2
 
 
Red Hat Openstack Enterprise openstack-tripleo-common directory traversal0.00CVE-2017-2627
1231295.44.36.5
 
 
libbpg BPG Encoder NULL Pointer Dereference denial of service0.00CVE-2017-2575
1231285.44.76.1
 
 
Cobbler cobbler-web directory traversal0.00CVE-2016-9605
1231275.96.35.4
 
 
IBM API Connect Hijacking privilege escalation0.00CVE-2018-1599

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!