CVSSv3 06/07/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1362408.57.39.8
 
 
HotelDruid tab_tariffe.php sql injection0.07CVE-2019-9087
1362398.57.39.8
 
 
HotelDruid visualizza_tabelle.php sql injection0.00CVE-2019-9086
1362384.64.34.9
 
 
HotelDruid tab_tariffe.php divide by zero0.00CVE-2019-9084
1362375.35.3
 
 
 
Nextcloud App Extract os command injection0.00CVE-2019-5441
1362367.37.37.4
 
 
DameWare Remote Mini Control Key Negotiation out-of-bounds read0.00CVE-2019-3957
1362357.37.37.4
 
 
DameWare Remote Mini Control Key Negotiation out-of-bounds read0.07CVE-2019-3956
1362347.47.37.5
 
 
DameWare Remote Mini Control Key Negotiation memory corruption0.00CVE-2019-3955
1362337.35.98.8
 
 
Google Android Bluetooth Low Energy access control0.04CVE-2019-2102
1362324.43.35.5
 
 
Google Android uvc_driver.c uvc_parse_standard_control out-of-bounds read0.00CVE-2019-2101
1362316.55.37.8
 
 
Google Android nfa_rw_act.cc nfa_rw_store_ndef_rx_buf out-of-bounds write0.00CVE-2019-2099
1362306.55.37.8
 
 
Google Android NotificationManagerService.java areNotificationsEnabledForPackage access control0.06CVE-2019-2098
1362298.57.39.8
 
 
Google Android Proxy Configuration hydrogen-alias-analysis.h HAliasAnalyzer.Query type conversion0.07CVE-2019-2097
1362286.55.37.8
 
 
Google Android Audio Server EffectBundle.cpp EffectRelease double free0.00CVE-2019-2096
1362276.66.37.0
 
 
Google Android SkPixelRef.cpp callGenIDChangeListeners race condition0.05CVE-2019-2095
1362267.06.37.8
 
 
Google Android NuPlayerCCDecoder.cpp parseMPEGCCData out-of-bounds write0.07CVE-2019-2094
1362257.56.38.8
 
 
Google Android nlc_dec.cpp huff_dec_1D out-of-bounds write0.00CVE-2019-2093
1362246.55.37.8
 
 
Google Android Permission Check DevicePolicyManagerService.java isSeparateProfileChallengeAllowed access control0.08CVE-2019-2092
1362236.55.37.8
 
 
Google Android Permission Check DevicePolicyManagerService.java GetPermittedAccessibilityServicesForUser access control0.00CVE-2019-2091
1362226.55.37.8
 
 
Google Android Permission PackageManagerService.java isPackageDeviceAdminOnAnyUser permission0.07CVE-2019-2090
1362216.25.37.1
 
 
libqb shm link following0.04CVE-2019-12779
1362207.35.98.8
 
 
Logitech R700 injection0.07CVE-2019-12506
1362197.35.98.8
 
 
Inateck WP1001 injection0.00CVE-2019-12505
1362187.35.98.8
 
 
Inateck WP2002 insufficient verification of data authenticity0.00CVE-2019-12504
1362177.56.38.8
 
 
Moxa AWK-3121 memory corruption0.00CVE-2018-10703
1362167.56.38.8
 
 
Moxa AWK-3121 command injection0.00CVE-2018-10702
1362157.56.38.8
 
 
Moxa AWK-3121 memory corruption0.00CVE-2018-10701
1362145.24.36.1
 
 
Moxa AWK-3121 cross site scripting0.00CVE-2018-10700
1362137.56.38.8
 
 
Moxa AWK-3121 Certificate Upload command injection0.00CVE-2018-10699
1362128.57.39.8
 
 
Moxa AWK-3121 Telnet Service credentials management0.00CVE-2018-10698
1362117.56.38.8
 
 
Moxa AWK-3121 command injection0.00CVE-2018-10697
1362106.54.38.8
 
 
Moxa AWK-3121 Web Interface iw_webSetParameters cross-site request forgery0.00CVE-2018-10696
1362097.56.38.8
 
 
Moxa AWK-3121 memory corruption0.00CVE-2018-10695
1362086.85.68.1
 
 
Moxa AWK-3121 WiFi credentials management0.00CVE-2018-10694
1362077.56.38.8
 
 
Moxa AWK-3121 memory corruption0.00CVE-2018-10693
1362065.14.26.1
 
 
Moxa AWK-3121 Session Cookie httponly cross site scripting0.06CVE-2018-10692
1362056.45.37.5
 
 
Moxa AWK-3121 systemlog.log access control0.04CVE-2018-10691
1362048.18.18.1
 
 
Munica Web Server Communication credentials management0.00CVE-2018-10690
1362035.13.76.5
 
 
Gemalto Admin Control Center Cookie httponly information disclosure0.00CVE-2019-8283
1362025.55.65.3
 
 
Gemalto Admin Control Center access control0.04CVE-2019-8282
1362017.06.37.8
 
 
Panasonic FPWIN Pro Project File type conversion0.06CVE-2019-6532

Want to stay up to date on a daily basis?

Enable the mail alert feature now!