CVSSv3 06/25/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1368905.55.65.3
 
 
AMD Platform Security Processor Secure Encrypted Virtualization Elliptic-Curve cryptographic issues0.00CVE-2019-9836
1368895.24.36.1
 
 
Tenable Nessus Reflected cross site scripting0.05CVE-2019-3961
1368886.55.37.8
 
 
PC-Doctor ToolBox uncontrolled search path0.00CVE-2019-12280
1368876.04.27.8
 
 
HP Support Assistant access control0.08CVE-2019-6329
1368866.55.37.8
 
 
HP Support Assistant access control0.00CVE-2019-6328
1368855.35.35.3
 
 
IBM API Connect information disclosure0.00CVE-2019-4382
1368844.34.34.3
 
 
IBM Sterling B2B Integrator information disclosure0.06CVE-2019-4377
1368835.96.35.4
 
 
IBM Security Access Manager access control0.00CVE-2019-4158
1368825.24.36.1
 
 
IBM Security Access Manager Web UI cross site scripting0.00CVE-2019-4157
1368815.75.65.9
 
 
IBM Security Access Manager information disclosure0.00CVE-2019-4156
1368805.54.36.8
 
 
IBM Security Access Manager redirect0.00CVE-2019-4153
1368795.05.64.4
 
 
IBM Security Access Manager Session Expiration session fixiation0.00CVE-2019-4152
1368785.75.65.9
 
 
IBM Security Access Manager inadequate encryption0.04CVE-2019-4151
1368774.75.63.7
 
 
IBM Security Access Manager certificate validation0.00CVE-2019-4150
1368765.23.37.1
 
 
IBM Security Access Manager information disclosure0.00CVE-2019-4145
1368757.56.38.8
 
 
IBM Security Access Manager Impersonation access control0.00CVE-2019-4135
1368745.44.76.1
 
 
LiveZilla Server Subject ticket.php cross site scripting0.00CVE-2019-12964
1368735.44.76.1
 
 
LiveZilla Server Create Ticket chat.php cross site scripting0.00CVE-2019-12963
1368725.44.76.1
 
 
LiveZilla Server index.php cross site scripting0.00CVE-2019-12962
1368717.56.38.8
 
 
LiveZilla Server Export injection0.00CVE-2019-12961
1368708.57.39.8
 
 
LiveZilla Server functions.internal.build.inc.php sql injection0.00CVE-2019-12960
1368697.47.87.0
 
 
Linux Kernel mmu_context_book3s64.c memory corruption0.06CVE-2019-12817
1368685.35.35.3
 
 
IBM API Connect information disclosure0.00CVE-2018-2013
1368675.35.35.3
 
 
IBM API Connect information disclosure0.00CVE-2018-2011
1368667.56.38.8
 
 
IBM API Connect cross-site request forgery0.00CVE-2018-1858
1368654.83.56.1
 
 
pfSense diag_command.php cross site scripting0.05CVE-2019-12949
1368645.45.35.5
 
 
Xpdf FoFiType1C.cc convertToType0 out-of-bounds read0.00CVE-2019-12958
1368636.55.37.8
 
 
Xpdf FoFiType1C.cc convertToType1 out-of-bounds read0.00CVE-2019-12957

Do you know our Splunk app?

Download it now for free!