CVSSv3 02/12/2019

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1433508.06.39.8
 
 
Adobe Acrobat Reader privileges management0.00CVE-2018-19725
1356376.55.37.8
 
 
Adobe Creative Cloud Desktop Application Installer untrusted search path0.00CVE-2019-7093
1356365.24.36.1
 
 
Adobe ColdFusion cross site scripting0.00CVE-2019-7092
1356358.57.39.8
 
 
Adobe ColdFusion Deserialization deserialization0.08CVE-2019-7091
1356345.44.36.5
 
 
Adobe Flash Player out-of-bounds read0.00CVE-2019-7090
1356335.94.37.5
 
 
Adobe Acrobat Reader information disclosure0.00CVE-2019-7089
1356328.06.39.8
 
 
Adobe Acrobat Reader type conversion0.01CVE-2019-7087
1356318.06.39.8
 
 
Adobe Acrobat Reader type conversion0.00CVE-2019-7086
1356308.06.39.8
 
 
Adobe Acrobat Reader memory corruption0.00CVE-2019-7085
1356298.06.39.8
 
 
Adobe Acrobat Reader use after free0.00CVE-2019-7084
1356288.06.39.8
 
 
Adobe Acrobat Reader use after free0.00CVE-2019-7083
1356278.06.39.8
 
 
Adobe Acrobat Reader use after free0.02CVE-2019-7082
1356265.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.01CVE-2019-7081
1356258.06.39.8
 
 
Adobe Acrobat Reader double free0.00CVE-2019-7080
1356247.56.38.8
 
 
Adobe Acrobat Reader out-of-bounds write0.00CVE-2019-7079
1356237.56.38.8
 
 
Adobe Acrobat Reader use after free0.00CVE-2019-7078
1356227.56.38.8
 
 
Adobe Acrobat Reader use after free0.00CVE-2019-7077
1356218.06.39.8
 
 
Adobe Acrobat Reader null pointer dereference0.00CVE-2019-7076
1356206.46.36.5
 
 
Adobe Acrobat Reader use after free0.00CVE-2019-7075
1356195.44.36.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2019-7074
1356185.44.36.5
 
 
Adobe Acrobat Reader out-of-bounds read0.01CVE-2019-7073
1356177.56.38.8
 
 
Adobe Acrobat Reader use after free0.00CVE-2019-7072
1356165.44.36.5
 
 
Adobe Acrobat Reader out-of-bounds read0.01CVE-2019-7071
1356157.56.38.8
 
 
Adobe Acrobat Reader use after free0.01CVE-2019-7070
1356147.56.38.8
 
 
Adobe Acrobat Reader type conversion0.00CVE-2019-7069
1356138.06.39.8
 
 
Adobe Acrobat Reader use after free0.00CVE-2019-7068
1356125.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.01CVE-2019-7067
1356118.06.39.8
 
 
Adobe Acrobat Reader null pointer dereference0.00CVE-2019-7066
1356105.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2019-7065
1356095.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2019-7064

Do you know our Splunk app?

Download it now for free!