CVSSv3 05/07/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1344734.74.15.4
 
 
Mahara Collection Title cross site scripting0.00CVE-2019-9709
1344724.94.94.9
 
 
Mahara access control0.00CVE-2019-9708
1344716.75.38.1
 
 
JioFi jmr1140 qcmap_auth cross-site request forgery0.05CVE-2019-7746
1344707.55.39.8
 
 
JioFi jmr1140 qcmap_web_cgi Password credentials management0.05CVE-2019-7745
1344695.24.36.1
 
 
JioFi jmr1140 Post qcmap_web_cgi Reflected cross site scripting0.05CVE-2019-7687
1344688.57.39.8
 
 
Shenzhen Coship WM3300 Password Reset wl_security_2G.asp credentials management0.06CVE-2019-7564
1344675.24.36.1
 
 
Rukovoditel cross site scripting0.00CVE-2019-7541
1344669.09.88.1
 
 
KDE KAuth Helpers DBusHelperProxy.cpp input validation0.00CVE-2019-7443
1344655.24.36.1
 
 
Zoho ManageEngine Netflow Analyzer Professional Administration Zone linkdownalertConfig.jsp cross site scripting0.00CVE-2019-7427
1344645.24.36.1
 
 
Zoho ManageEngine Netflow Analyzer Professional Administration Zone linkdownalertConfig.jsp cross site scripting0.00CVE-2019-7426
1344636.76.37.1
 
 
IBM TRIRIGA Application Platform XML Data xml external entity reference0.00CVE-2019-4208
1344623.33.33.3
 
 
IBM TRIRIGA Application Platform information disclosure0.00CVE-2019-4207
1344617.27.37.0
 
 
Linux Kernel ioports use after free0.07CVE-2019-11811
1344607.57.57.5
 
 
Linux Kernel megaraid_sas_base.c megasas_create_frame_pool null pointer dereference0.09CVE-2019-11810
1344595.44.76.1
 
 
Sonatype Nexus Repository Manager cross site scripting0.00CVE-2019-11629
1344588.57.39.8
 
 
Hisilicon HI3516 RTSP memory corruption0.00CVE-2019-11560
1344576.85.68.1
 
 
Ninja Forms Plugin upload.php path traversal0.00CVE-2019-10869
1344566.45.37.5
 
 
Axios Content input validation0.00CVE-2019-10742
1344558.57.39.8
 
 
WAGO 750-873 Web GUI hard-coded credentials0.06CVE-2019-10712
1344548.57.39.8
 
 
Parsec Account access control0.05CVE-2018-6634
1344536.55.37.8
 
 
Google Android NVIDIA Tegra TLK Widevine Trust App access control0.06CVE-2018-6243
1344527.26.38.1
 
 
Linux Kernel sas_expander.c smp_task_done race condition0.08CVE-2018-20836
1344515.24.36.1
 
 
Allied Telesis 8100L-8 ipv4_interface.php cross site scripting0.00CVE-2018-20503
1344504.34.34.3
 
 
IBM TRIRIGA Application Platform information disclosure0.00CVE-2018-2008
1344496.54.38.8
 
 
IBM Cram Social Program Management cross-site request forgery0.00CVE-2018-2001
1344486.45.37.5
 
 
WP Backup+ Plugin download.sql information disclosure0.00CVE-2018-19456
1344478.57.39.8
 
 
BlogEngine.NET POST Body metaweblog.axd xml external entity reference0.09CVE-2018-14485
1344465.44.76.1
 
 
Coppermine Photo Gallery ecard.php cross site scripting0.00CVE-2018-14478
1344456.45.37.5
 
 
Phoenix Contact FL SWITCH Web UI resource consumption0.00CVE-2018-13994
1344446.54.38.8
 
 
Phoenix Contact FL SWITCH Web UI cross-site request forgery0.00CVE-2018-13993
1344437.75.69.8
 
 
Phoenix Contact FL SWITCH Web UI Credentials credentials management0.00CVE-2018-13992
1344425.35.35.3
 
 
Phoenix Contact FL SWITCH Web UI Firmware information disclosure0.00CVE-2018-13991
1344414.75.63.7
 
 
Ratpack Session Generator PRNG weak prng0.00CVE-2019-11808

Do you know our Splunk app?

Download it now for free!