CVSSv3 03/08/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1315307.55.39.8
 
 
Python Unicode urllib.parse.urlsplit information disclosureCVE-2019-9636
1315297.06.37.8
 
 
Google Go DLL Loader LoadLibrary privilege escalationCVE-2019-9634
1315285.95.36.5
 
 
GNOME glib GTask gsocketclient.c g_socket_client_connected_callback denial of serviceCVE-2019-9633
1315276.45.37.5
 
 
ESAFENET CDG download.jsp information disclosureCVE-2019-9632
1315268.57.39.8
 
 
Poppler CairoRescaleBox.cc downsample_row_box_filter memory corruptionCVE-2019-9631
1315256.15.37.0
 
 
CyberArk Endpoint Privilege Manager Kernel Driver CybKernelTracker.sys memory corruptionCVE-2019-9627
1315239.07.39.8
 
10.0UltraVNC VNC Client Out-of-Bounds memory corruptionCVE-2019-8280
1315227.76.37.5
 
9.3UltraVNC VNC Server Memory Leak memory corruptionCVE-2019-8277
1315217.16.37.5
 
7.5UltraVNC VNC Server Stack-based memory corruptionCVE-2019-8276
1315207.86.3
 
 
9.3UltraVNC VNC Server memory corruptionCVE-2019-8275
1315198.16.3
 
 
10.0UltraVNC VNC Server Heap-based memory corruptionCVE-2019-8274
1315188.76.39.8
 
10.0UltraVNC VNC Server Heap-based memory corruptionCVE-2019-8273
1315178.76.39.8
 
10.0UltraVNC VNC Server Off-By-One memory corruptionCVE-2019-8272
1315168.76.39.8
 
10.0UltraVNC VNC Server Heap-based memory corruptionCVE-2019-8271
1315156.85.37.5
 
7.5UltraVNC VNC Client Out-of-Bounds denial of serviceCVE-2019-8270
1315146.85.37.5
 
7.5UltraVNC VNC Client Stack-based denial of serviceCVE-2019-8269
1315139.07.39.8
 
10.0UltraVNC VNC Client ReadString memory corruptionCVE-2019-8268
1315126.85.37.5
 
7.5UltraVNC VNC Client Out-of-Bounds denial of serviceCVE-2019-8267
1315119.07.39.8
 
10.0UltraVNC VNC Client Mode Copybuffer memory corruptionCVE-2019-8266
1315109.07.39.8
 
10.0UltraVNC VNC Client Mode Out-of-Bounds memory corruptionCVE-2019-8265
1315099.07.39.8
 
10.0UltraVNC VNC Client Ultra2 Decoder Out-of-Bounds memory corruptionCVE-2019-8264
1315087.87.87.8
 
 
Pixar Renderman Install Helper Tool privilege escalationCVE-2019-5015
1315076.54.38.8
 
 
Cloud Foundry Container Runtime K8s Worker Node Deployment Credentials information disclosureCVE-2019-3780
1315068.88.88.8
 
 
Cloud Foundry Container Runtime Certificate privilege escalationCVE-2019-3779
1315056.05.36.7
 
 
Cisco NX-OS CLI privilege escalationCVE-2019-1609
1315046.05.36.7
 
 
Cisco NX-OS CLI privilege escalationCVE-2019-1608
1315036.05.36.7
 
 
Cisco NX-OS CLI privilege escalationCVE-2019-1607
1315026.55.37.8
 
 
Cisco NX-OS CLI privilege escalationCVE-2019-1606
1315017.87.87.8
 
 
Cisco NX-OS NX-API privilege escalationCVE-2019-1605
1315006.55.37.8
 
 
Cisco NX-OS User Account Management Interface privilege escalationCVE-2019-1604
1314996.55.37.8
 
 
Cisco NX-OS CLI privilege escalationCVE-2019-1603
1314986.55.37.8
 
 
Cisco NX-OS Filesystem Permission privilege escalationCVE-2019-1602
1314976.55.37.8
 
 
Cisco NX-OS Filesystem Permission privilege escalationCVE-2019-1601
1314966.54.38.8
 
 
JenkinsAppDynamics Dashboard Plugin AppDynamicsResultsPublisher.java information disclosureCVE-2019-1003039
1314955.53.37.8
 
 
Repository Connector Plugin ArtifactDeployer.java information disclosureCVE-2019-1003038
1314945.44.36.5
 
 
Azure VM Agents Plugin AzureVMCloud.java information disclosureCVE-2019-1003037
1314935.36.34.3
 
 
Azure VM Agents Plugin AzureVMAgent.java privilege escalationCVE-2019-1003036
1314924.34.34.3
 
 
Azure VM Agents Plugin AzureVMAgentTemplate.java information disclosureCVE-2019-1003035
1314918.67.49.9
 
 
Job DSL Plugin Sandbox AbstractDslScriptLoader.groovy Remote Code ExecutionCVE-2019-1003034
1314907.56.38.8
 
 
Groovy Plugin Sandbox StringScriptSource.java Remote Code ExecutionCVE-2019-1003033

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!