CVSSv3 01/27/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1622807.65.59.8
 
 
Symmetric DS mx4j improper authentication0.07CVE-2020-24231
1494775.15.34.8
 
 
TYPO3 svg.swf cross site scriting0.05CVE-2020-8091
1494764.13.54.8
 
 
A1 WLAN Box ADB Storage Service Stored cross site scripting0.08CVE-2020-8090
1494758.57.39.8
 
 
UseBB panel_login.php Type Juggling type confusion0.06CVE-2020-8088
1494748.57.39.8
 
 
SMC Networks D3G0804W Network Diagnostic Tools formSetDiagnosticToolsFmPing command injection0.00CVE-2020-8087
1494714.44.44.4
 
 
Sylius ResourceBundle request smuggling0.04CVE-2020-5220
1494705.05.54.4
 
 
Sylius Channel request smuggling0.08CVE-2020-5218
1494696.06.55.4
 
 
Ktor Proxy request smuggling0.04CVE-2020-5207
1494635.24.36.1
 
 
Synacor Zimbra Collaboration Reflected cross site scripting0.00CVE-2019-8947
1494625.24.36.1
 
 
Synacor Zimbra Collaboration Persistent cross site scripting0.00CVE-2019-8946
1494615.24.36.1
 
 
Synacor Zimbra Collaboration Persistent cross site scripting0.00CVE-2019-8945
1494404.43.35.5
 
 
Idelji Web ViewPoint ADB File Password insufficiently protected credentials0.04CVE-2019-19539
1494398.09.86.1
 
 
TP-LINK TL-WR849N Firmware softup improper authentication0.00CVE-2019-19143
1494285.24.36.1
 
 
Synacor Zimbra Collaboration Reflected cross site scripting0.06CVE-2019-15313
1494275.53.37.8
 
 
Rockwell Automation Arena Simulation Software information disclosure0.00CVE-2019-13521
1494265.53.37.8
 
 
Rockwell Automation Arena Simulation Software type confusion0.00CVE-2019-13519
1494253.62.44.8
 
 
Synacor Zimbra Collaboration Admin Console Reflected cross site scripting0.00CVE-2019-12427
1494244.43.55.4
 
 
Synacor Zimbra Collaboration Persistent cross site scripting0.06CVE-2019-11318
1494236.35.37.3
 
 
Pivotal tc Server/tc Runtimes JMX Socket Listener privileges management0.08CVE-2019-11288
1494204.64.54.7
 
 
Neato Botvac Connected NeatoCrypto Library authorization GenerateRobotPassword RNG random values0.00CVE-2018-19441
1494196.45.07.8
 
 
Valve Dota Map rendersystemdx9.dll code injection0.04CVE-2020-7952
1494186.45.07.8
 
 
Valve Dota Map meshsystem.dll code injection0.04CVE-2020-7951
1494176.45.07.8
 
 
Valve Dota Map meshsystem.dll code injection0.04CVE-2020-7950
1494166.45.07.8
 
 
Valve Dota Map schemasystem.dll GetValue code injection0.04CVE-2020-7949
1494157.47.37.5
 
 
Netty Incomplete Fix CVE-2019-16869 HTTP Smuggling request smuggling0.00CVE-2020-7238
1494147.55.39.8
 
 
TOTOLINK Realtek SDK Captcha formLogin improper authentication0.07CVE-2019-19825
1494137.56.38.8
 
 
TOTOLINK Realtek SDK formSysCmd os command injection0.07CVE-2019-19824
1494125.02.57.5
 
 
TOTOLINK/CIK TELECOM/KCTVJEJU/Hi-Wifi/HCN/T-broad Router Administration Interface insufficiently protected credentials0.00CVE-2019-19823
1494116.45.37.5
 
 
TOTOLINK/CIK TELECOM/KCTVJEJU/Hi-Wifi/HCN/T-broad Router Administration Interface Config insufficiently protected credentials0.06CVE-2019-19822
1494104.64.05.3
 
 
BitDefender Endpoint Security Tools EPSecurityService.exe untrusted search path0.08CVE-2019-17099
1494097.76.59.0
 
 
BitDefender BOX 2 Bootstrap get_image_url os command injection0.00CVE-2019-17096
1494086.75.38.1
 
 
BitDefender BOX 2 API download_image os command injection0.07CVE-2019-17095
1494076.85.38.3
 
 
Belkin WeMo Insight Switch libbelkin_api.so stack-based overflow0.04CVE-2019-17094
1494067.47.37.5
 
 
AVB MOTU path traversal0.06CVE-2020-8009
1494058.27.39.1
 
 
GNU Aspell libaspell.a out-of-bounds read0.00CVE-2019-20433
1494047.87.87.8
 
 
Avast Secure Browser Update Check AvastBrowserUpdate.exe privileges management0.07CVE-2019-17190
1494035.35.74.9
 
 
BitDefender AV BDLDaemon default permission0.08CVE-2019-17103
1494027.05.88.3
 
 
BitDefender BOX 2 API update_setup unknown vulnerability0.05CVE-2019-17102
1494015.25.25.2
 
 
BitDefender Total Security 2020 bdserviceshost.exe untrusted search path0.00CVE-2019-17100
1493985.53.77.4
 
 
kantan netprint App X.509 Certificate certificate validation0.00CVE-2020-5522
1493975.53.77.4
 
 
kantan netprint App X.509 Certificate certificate validation0.00CVE-2020-5521
1493965.53.77.4
 
 
netprint App X.509 Certificate certificate validation0.00CVE-2020-5520
1493955.75.36.1
 
 
F-RevoCRM cross site scripting0.08CVE-2019-6036
1493943.63.34.0
 
 
SuSE Linux Enterprise Server 15 yast2-rmt Log log file0.05CVE-2018-20105
1493935.87.34.3
 
 
SuSE Linux Enterprise Server obs-service-tar_scm path traversal0.00CVE-2018-12476
1493924.43.35.5
 
 
virglrenderer vrend_renderer.c double free0.00CVE-2020-8003
1493914.43.35.5
 
 
virglrenderer vrend_renderer.c null pointer dereference0.00CVE-2020-8002
1493908.57.39.8
 
 
Intellian Aptus FTP hard-coded credentials0.06CVE-2020-8001
1493898.57.39.8
 
 
Intellian Aptus Web hard-coded credentials0.13CVE-2020-8000
1493888.57.39.8
 
 
Intellian Aptus hard-coded credentials0.00CVE-2020-7999

Might our Artificial Intelligence support you?

Check our Alexa App!