CVSSv3 09/08/2019info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1414047.56.38.8
 
 
event-tickets Plugin Export CSV Injection privilege escalationCVE-2019-16120
1414038.57.39.8
 
 
photo-gallery Plugin Albumsgalleries.php sql injectionCVE-2019-16119
1414025.24.36.1
 
 
photo-gallery Plugin Options.php cross site scriptingCVE-2019-16118
1414015.24.36.1
 
 
photo-gallery Plugin Galleries.php cross site scriptingCVE-2019-16117
1414006.55.37.8
 
 
Xpdf Function.cc transform memory corruptionCVE-2019-16115
1413997.56.38.8
 
 
Bludit upload-images.php privilege escalationCVE-2019-16113
1413985.55.65.3
 
 
Plataformatec Device Confirmation Token weak authenticationCVE-2019-16109
1413974.84.74.9
 
 
Silver Peak EdgeConnect SD-WAN directory traversalCVE-2019-16105
1413963.53.56.1
 
 
Silver Peak EdgeConnect SD-WAN cross site scriptingCVE-2019-16104
1413957.27.27.2
 
 
Silver Peak EdgeConnect SD-WAN spsshell privilege escalationCVE-2019-16103
1413948.57.39.8
 
 
Silver Peak EdgeConnect SD-WAN SNMP Service weak authenticationCVE-2019-16102
1413935.35.35.3
 
 
Silver Peak EdgeConnect SD-WAN REST API banners information disclosureCVE-2019-16101
1413924.34.37.5
 
 
Silver Peak EdgeConnect SD-WAN Web Interface Slow denial of serviceCVE-2019-16100
1413916.54.38.8
 
 
Silver Peak EdgeConnect SD-WAN SWF File cross site request forgeryCVE-2019-16099
1413906.46.36.5
 
 
Harbor API user.go privilege escalationCVE-2019-16097
1413897.47.37.5
 
 
IMAPFilter SSL Certificate Validator weak authenticationCVE-2016-10937
1413887.47.37.5
 
 
Kilo Tab Integer Overflow memory corruptionCVE-2019-16096
1413877.57.57.5
 
 
Symonics libmysofa reader.c getDimension information disclosureCVE-2019-16095
1413867.57.57.5
 
 
Symonics libmysofa dataobject.c readOHDRHeaderMessageDataLayout information disclosureCVE-2019-16094
1413859.89.89.8
 
 
Symonics libmysofa dataobject.c readOHDRHeaderMessageDataLayout memory corruptionCVE-2019-16093
1413847.55.39.8
 
 
Symonics libmysofa reader.c getHrtf denial of serviceCVE-2019-16092
1413837.47.37.5
 
 
Symonics libmysofa fractalhead.c directblockRead memory corruptionCVE-2019-16091

Might our Artificial Intelligence support you?

Check our Alexa App!