CVSSv3 08/28/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1410206.37.35.3
 
 
Lexmark Products Access Control access control0.00CVE-2019-9935
1410196.37.35.3
 
 
Lexmark Products Access Control access control0.00CVE-2019-9934
1410188.57.39.8
 
 
Lexmark Products memory corruption0.00CVE-2019-9933
1410178.57.39.8
 
 
Lexmark Products memory corruption0.00CVE-2019-9932
1410166.45.37.5
 
 
Lexmark Printer SNMP Service input validation0.00CVE-2019-9931
1410158.57.39.8
 
 
Lexmark Products integer overflow0.07CVE-2019-9930
1410145.24.36.1
 
 
Fortinet FortiWeb Report Message cross site scripting0.06CVE-2019-5590
1410136.04.37.7
 
 
Cisco NX-OS Virtual Shell Session Management resource consumption0.00CVE-2019-1965
1410126.45.37.5
 
 
Cisco NX-OS input validation0.06CVE-2019-1964
1410115.44.36.5
 
 
Cisco FXOS/NX-OS SNMP input validation0.00CVE-2019-1963
1410106.45.37.5
 
 
Cisco NX-OS Fabric Services input validation0.00CVE-2019-1962
1410098.27.39.1
 
 
OpenStack os-vif linuxbridge impl_pyroute2.py PyRoute2.add resource management0.00CVE-2019-15753
1410086.55.37.8
 
 
Docker Desktop Community Edition docker-credential-wincred.exe access control0.07CVE-2019-15752
1410077.87.87.8
 
 
CloudBerry Backup Backup Plan access control0.05CVE-2019-15720
1410066.54.38.8
 
 
MyT Project Management cross-site request forgery0.00CVE-2019-15496
1410054.43.55.4
 
 
LibreNMS Admin Console cross site scripting0.00CVE-2019-15230
1410045.05.34.7
 
 
Comodo Antivirus Sandbox Container cmdguard.sys use after free0.03CVE-2019-14694
1410036.54.38.8
 
 
Knowage credentials management0.00CVE-2019-13348
1410025.24.36.1
 
 
Knowage ChangePwdServlet Page cross site scripting0.05CVE-2019-13189
1410018.16.310.0
 
 
Cisco IOS XE REST API Virtual Service Container improper authentication0.06CVE-2019-12643
1410005.13.76.5
 
 
IBM Application Security on Cloud Plugin Password information disclosure0.05CVE-2019-10391
1409997.56.38.8
 
 
Splunk Plugin HTTP Endpoint input validation0.07CVE-2019-10390
1409987.05.38.8
 
 
Jenkins CSRF Protection cross-site request forgery0.00CVE-2019-10384
1409973.62.44.8
 
 
Jenkins Update Center Stored cross site scripting0.07CVE-2019-10383
1409966.37.35.3
 
 
Lexmark Device Legacy Finger Service 7pk security0.06CVE-2019-10059
1409958.27.39.1
 
 
Lexmark Products Access Control access control0.07CVE-2019-10058
1409945.44.36.5
 
 
Lexmark Products cross-site request forgery0.07CVE-2019-10057
1409936.45.37.5
 
 
Suricata Type decode-ethernet.c DecodeEthernet memory corruption0.00CVE-2019-10056
1409926.45.37.5
 
 
Suricata mod.rs ftp_pasv_response input validation0.00CVE-2019-10055
1409916.45.37.5
 
 
Suricata Reply nfs3.rs process_reply_record_v3 memory corruption0.04CVE-2019-10054
1409906.45.37.5
 
 
Suricata Rust Environment parser.rs parse_clientid_option neutralization0.07CVE-2019-10052
1409896.45.37.5
 
 
Suricata files.rs filetracker_newchunk unusual condition0.08CVE-2019-10051
1409884.43.35.5
 
 
WTF Permission config.yml permission0.00CVE-2019-15716
1409876.37.35.3
 
 
Entropic main.js path traversal0.00CVE-2019-15714
1409865.24.36.1
 
 
my-calendar Plugin cross site scripting0.05CVE-2019-15713
1409857.55.39.8
 
 
Gallagher Command Centre Log File Command_centre.log credentials management0.06CVE-2019-15294
1409845.24.36.1
 
 
UpdraftPlus Plugin Log cross site scripting0.00CVE-2017-18593
1409835.24.36.1
 
 
iThemes Builder Style Manager remove_query_arg cross site scripting0.06CVE-2015-9379
1409825.24.36.1
 
 
iThemes Builder Theme Market remove_query_arg cross site scripting0.00CVE-2015-9378
1409815.24.36.1
 
 
iThemes Builder Theme Depot remove_query_arg cross site scripting0.00CVE-2015-9377

Do you know our Splunk app?

Download it now for free!