CVSSv3 01/30/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1303517.47.37.5
 
 
idreamsoft iCMS editor.admincp.php directory traversal0.00CVE-2019-7237
1303507.47.37.5
 
 
idreamsoft iCMS editor.admincp.php directory traversal0.00CVE-2019-7236
1303497.06.57.5
 
 
idreamsoft iCMS directory traversal0.00CVE-2019-7235
1303487.25.39.1
 
 
idreamsoft iCMS directory traversal0.00CVE-2019-7234
1303476.54.38.8
 
 
libdoc catdoc.c doc2text NULL Pointer Dereference denial of service0.00CVE-2019-7233
1303464.64.34.9
 
 
LabKey Server Community Edition Mount denial of service0.00CVE-2019-3913
1303456.77.36.1
 
 
LabKey Server Community Edition Open Redirect0.00CVE-2019-3912
1303445.75.36.1
 
 
LabKey Server Community Edition query Reflected cross site scripting0.00CVE-2019-3911
1303435.24.36.1
 
 
Palo Alto PAN-OS Management Web Interface cross site scripting0.00CVE-2019-1566
1303426.56.5
 
 
 
Palo Alto PAN-OS External Dynamics List privilege escalation0.00CVE-2019-1565
1303415.35.3
 
 
 
Apache HTTP Server mod_ssl Loop denial of service0.00CVE-2019-0190
1303407.26.38.1
 
 
Foxit PDF Reader XFA Element Out-of-Bounds memory corruption0.00CVE-2018-3956
1303398.57.39.8
 
 
LibVNCServer rfbserver.c Out-of-Bounds memory corruption0.00CVE-2018-20750
1303388.57.39.8
 
 
LibVNCServer rfbserver.c Out-of-Bounds memory corruption0.00CVE-2018-20749
1303378.57.39.8
 
 
LibVNC rfbproto.c Out-of-Bounds memory corruption0.00CVE-2018-20748
1303368.48.38.6
 
 
PrinceXML XML Data XML External Entity0.00CVE-2018-19858
1303356.36.56.1
 
 
FreshRSS cross site scripting0.00CVE-2018-19782
1303345.35.35.3
 
 
ARM Trusted Firmware-A information disclosure0.00CVE-2018-19440
1303336.55.37.8
 
 
CX-One/CX-Protocol Type Confusion memory corruption0.00CVE-2018-19027
1303325.55.5
 
 
 
Cisco WebEx Meetings Server Castor XML XML External Entity0.00CVE-2018-18895
1303318.57.39.8
 
 
Comodo UTM Firewall Web Console Remote Code Execution0.00CVE-2018-17431
1303307.47.37.5
 
 
Apache HTTP Server mod_session Expired privilege escalation0.00CVE-2018-17199
1303295.35.35.3
 
 
Apache HTTP Server mod_http2 Slowloris denial of service0.00CVE-2018-17189
1303285.15.05.3
 
 
TitanHQ SpamTitan Anti-Spam Filter Bypass privilege escalation0.00CVE-2018-15136
1303276.67.16.1
 
 
OX Software App Suite directory traversal0.00CVE-2018-12611
1303265.35.35.3
 
 
OX Software App Suite information disclosure0.00CVE-2018-12610
1303256.46.36.5
 
 
OX Software App Suite Server-Side Request Forgery0.00CVE-2018-12609

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!