CVSSv3 04/03/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1528207.26.38.1
 
 
Mozilla Firefox ReadableStream Use-After-Free memory corruptionCVE-2020-6820
1528197.26.38.1
 
 
Mozilla Firefox nsDocShell Destructor Use-After-Free memory corruptionCVE-2020-6819
1527677.56.38.8
 
 
TestLink File Upload keywordsImport.php privilege escalationCVE-2020-8639
1527668.57.39.8
 
 
TestLink planUrgency.php sql injectionCVE-2020-8638
1527658.57.39.8
 
 
TestLink dragdroptreenodes.php sql injectionCVE-2020-8637
1527648.57.39.8
 
 
utils-extend Remote Code ExecutionCVE-2020-8147
1527635.75.36.1
 
 
Revive Adserver CSRF Protection cross site request forgeryCVE-2020-8143
1527625.44.16.8
 
 
Revive Adserver User Interface privilege escalationCVE-2020-8142
1527616.45.37.5
 
 
VISAM VBASE Editor/VBASE Web-Remote Module URL information disclosureCVE-2020-7008
1527607.56.38.8
 
 
VISAM VBASE Editor/VBASE Web-Remote Module privilege escalationCVE-2020-7004
1527596.45.37.5
 
 
VISAM VBASE Editor/VBASE Web-Remote Module Key information disclosureCVE-2020-7000
1527588.57.39.8
 
 
Hirschmann Automation Control HiOS/HiSecOS URL Argument memory corruptionCVE-2020-6994
1527557.27.07.4
 
 
IBM Spectrum Scale privilege escalationCVE-2020-4273
1527547.35.69.1
 
 
GnuTLS DTLS weak encryptionCVE-2020-11501
1527535.63.77.5
 
 
Zoom Client for Meetings weak encryptionCVE-2020-11500
1527524.84.35.3
 
 
MediaWiki CSS cross site scriptingCVE-2020-10960
1527515.13.96.4
 
 
Eclipse Che Workspace Pod privilege escalationCVE-2020-10689
1527505.42.58.4
 
 
VISAM VBASE Editor/VBASE Web-Remote Module Password Hash weak encryptionCVE-2020-10601
1527498.57.39.8
 
 
VISAM VBASE Editor/VBASE Web-Remote Module ActiveX memory corruptionCVE-2020-10599
1527485.25.64.8
 
 
SuSE Linux Enterprise Server autoyast2 privilege escalationCVE-2019-18905
1527475.44.36.5
 
 
SuSE Linux Enterprise Server Resource Exhaustion denial of serviceCVE-2019-18904
1527465.24.36.1
 
 
OneTone Theme theme-functions.php cross site scriptingCVE-2019-17231
1527456.37.35.3
 
 
OneTone Theme Options theme-functions.php privilege escalationCVE-2019-17230
1527447.86.39.3
 
 
SuSE Openstack Cloud/OpenStack Cloud Crowbar privilege escalationCVE-2018-17954
1527232.72.43.1
 
 
ViewVC CVS show_subdir_lastmod cross site scriptingCVE-2020-5283

Want to stay up to date on a daily basis?

Enable the mail alert feature now!