CVSSv3 08/29/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1411196.55.37.8
 
 
Check Point Endpoint Security Initial Client DLL untrusted search path0.00CVE-2019-8461
1411037.87.87.8
 
 
Avira Free Security Suite Software Updater Folder access control0.08CVE-2019-11396
1411026.76.37.2
 
 
Snare Central DiskManager.php os command injection0.00CVE-2019-11364
1411016.76.37.2
 
 
Snare Central UserGroupQuery.php sql injection0.07CVE-2019-11363
1410935.24.36.1
 
 
DomainMod cost-by-month.php cross site scripting0.00CVE-2019-15811
1410925.05.34.7
 
 
Linux Kernel SAS Expander Discovery sas_expander.c resource management0.06CVE-2019-15807
1410917.04.39.8
 
 
CommScope ARRIS TR4400 Administrative Interface basic_sett.html Credentials access control0.05CVE-2019-15806
1410908.06.39.8
 
 
CommScope ARRIS TR4400 Administrative Interface login.html Credentials credentials management0.05CVE-2019-15805
1410898.06.39.8
 
 
irssi CAP use after free0.03CVE-2019-15717
1410886.45.37.5
 
 
TeamSpeak Client input validation0.00CVE-2019-15502
1410875.35.35.3
 
 
WooCommerce PayPal Checkout Payment Gateway Plugin Purchasing input validation0.08CVE-2019-14979
1410866.37.35.3
 
 
WooCommerce PayU India Payment Gateway Plugin Purchase Price input validation0.08CVE-2019-14978
1410857.37.3
 
 
 
WooCommerce Instamojo Payment Gateway Plugin Purchase amount Price input validation0.06CVE-2019-14977
1410847.06.37.8
 
 
VideoLAN VLC Media Player MKV File event_thread_t memory corruption0.05CVE-2019-14970
1410837.06.37.8
 
 
VideoLAN VLC Media Player virtual_segment.cpp seek use after free0.05CVE-2019-14778
1410827.06.37.8
 
 
VideoLAN VLC Media Player mkv.cpp use after free0.05CVE-2019-14777
1410817.06.37.8
 
 
VideoLAN VLC Media Player MKV File asf.c DemuxInit out-of-bounds read0.05CVE-2019-14776
1410806.04.37.8
 
 
VideoLAN VLC Media Player WMV File asf.c SeekIndex divide by zero0.07CVE-2019-14535
1410794.94.35.5
 
 
VideoLAN VLC Media Player asf.c SeekPercent null pointer dereference0.05CVE-2019-14534
1410787.06.37.8
 
 
VideoLAN VLC Media Player asf.c use after free0.00CVE-2019-14533
1410776.04.37.8
 
 
VideoLAN VLC Media Player CAF File caf.c divide by zero0.04CVE-2019-14498
1410767.06.37.8
 
 
VideoLAN VLC Media Player OGG File xiph.h xiph_PackHeaders out-of-bounds read0.00CVE-2019-14438
1410757.06.37.8
 
 
VideoLAN VLC Media Player OGG File xiph.h xiph_SplitHeaders use after free0.05CVE-2019-14437
1410747.47.37.5
 
 
Citrix Storefront Server XML Data xml external entity reference0.07CVE-2019-13608
1410735.74.57.0
 
 
Apport Symlink .apport-ignore.xml race condition0.07CVE-2019-7307
1410725.44.56.3
 
 
IBM i User Profile Restore access control0.04CVE-2019-4536
1410715.86.35.2
 
 
IBM Cloud Automation Manager Script injection0.07CVE-2019-4133
1410703.33.33.3
 
 
IBM Cloud Automation Manager information disclosure0.00CVE-2019-4132
1410696.03.38.8
 
 
Confluence Server/Confluence Data Center Page Export WEB-INF credentials management0.05CVE-2019-3394
1410688.57.39.8
 
 
Clara Genomics Analysis allocate_block.cpp integer overflow0.00CVE-2019-15788
1410677.47.37.5
 
 
libZetta.rs zpool Parser integer overflow0.00CVE-2019-15787
1410668.57.39.8
 
 
ROBOTIS Dynamixel SDK rxpacket Packet memory corruption0.00CVE-2019-15786
1410658.57.39.8
 
 
FontForge prefs.c PrefsUI_LoadPrefs memory corruption0.00CVE-2019-15785
1410648.57.39.8
 
 
Secure Reliable Transport SRT Connection memory corruption0.00CVE-2019-15784
1410638.57.39.8
 
 
Lute-Tab pdf_print.cc memory corruption0.05CVE-2019-15783
1410625.24.36.1
 
 
WebTorrent HTTP Server cross site scripting0.00CVE-2019-15782
1410616.54.38.8
 
 
facebook-by-weblizar Plugin cross-site request forgery0.00CVE-2019-15781
1410609.89.89.8
 
 
formidable Plugin deserialization0.00CVE-2019-15780
1410598.88.88.8
 
 
insta-gallery Plugin cross-site request forgery0.06CVE-2019-15779
1410584.43.55.4
 
 
woo-variation-gallery Plugin cross site scripting0.07CVE-2019-15778

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!