CVSSv3 04/08/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1530037.56.38.8
 
 
As argocd-server privileges management0.00CVE-2020-8828
1530027.47.37.5
 
 
As Argo API authentication0.00CVE-2020-8827
1530017.47.37.5
 
 
As Argo Web Interface Reuse session fixiation0.00CVE-2020-8826
1530005.44.36.5
 
 
Amcrest Camera/NVR Service Port 37777 null pointer dereference0.00CVE-2020-5736
1529997.56.38.8
 
 
Amcrest Camera/NVR Service Port 37777 stack-based buffer overflow0.00CVE-2020-5735
1529987.26.38.1
 
 
EasyBlocks IPv6 Management Console session fixiation0.00CVE-2020-5550
1529978.07.38.8
 
 
EasyBlocks IPv6 cross-site request forgery0.00CVE-2020-5549
1529964.34.34.3
 
 
IBM Security Information Queue Web UI session fixiation0.00CVE-2020-4291
1529955.96.35.4
 
 
IBM Security Information Queue Configuration authentication spoofing0.00CVE-2020-4290
1529944.53.75.3
 
 
IBM Security Information Queue httponly information disclosure0.00CVE-2020-4289
1529935.35.35.3
 
 
IBM Security Information Queue Web UI information disclosure0.00CVE-2020-4284
1529925.36.34.3
 
 
IBM Security Information Queue authentication0.00CVE-2020-4282
1529914.74.15.4
 
 
IBM DOORS Next Generation Web UI cross site scriting0.00CVE-2020-4252
1529902.72.72.7
 
 
IBM Security Information Queue Error information disclosure0.00CVE-2020-4164
1529894.43.05.8
 
 
Linux Kernel KVM Hypervisor information disclosure0.07CVE-2020-2732
1529887.77.38.1
 
 
Palo Alto PAN-OS Log Forwarding Card format string0.00CVE-2020-1992
1529876.55.37.8
 
 
Palo Alto Traps Temp File temp file0.00CVE-2020-1991
1529866.76.37.2
 
 
Palo Alto PAN-OS Management Server stack-based buffer overflow0.05CVE-2020-1990
1529855.74.57.0
 
 
Palo Alto Global Protect Agent privileges assignment0.00CVE-2020-1989
1529844.85.34.2
 
 
Palo Alto Global Protect Agent Unquoted Search Path unquoted search path0.00CVE-2020-1988
1529833.33.33.92.8
 
Palo Alto Networks Global Protect Agent Logging information disclosure0.00CVE-2020-1987
1529825.55.55.5
 
 
Secdo input validation0.00CVE-2020-1986
1529816.55.37.8
 
 
Secdo Permission Logs default permission0.00CVE-2020-1985
1529806.55.37.8
 
 
Secdo Privileges file inclusion0.04CVE-2020-1984
1529794.94.05.8
 
 
Palo Alto VM Series Firewall for Microsoft Azure TechSupport Files credentials management0.00CVE-2020-1978
1529786.55.37.8
 
 
Oculus Desktop OVRRedir.exe privileges management0.00CVE-2020-1885
1529776.45.37.5
 
 
Juniper Junos Ethernet OAM denial of service0.04CVE-2020-1639
1529766.45.37.5
 
 
Juniper Junos FPC denial of service0.00CVE-2020-1638
1529757.88.37.2
 
 
Juniper Junos UAC Policy authentication0.00CVE-2020-1637
1529747.57.57.5
 
 
Juniper Junos Configuration integer overflow0.04CVE-2020-1634
1529735.25.35.0
 
 
Juniper Junos Routing Engine toctou0.04CVE-2020-1630
1529724.83.75.9
 
 
Juniper Junos RPD denial of service0.00CVE-2020-1629
1529715.35.35.3
 
 
Juniper Junos information disclosure0.04CVE-2020-1628
1529706.45.37.5
 
 
Juniper Junos denial of service0.00CVE-2020-1627
1529696.45.37.5
 
 
Juniper Junos denial of service0.00CVE-2020-1626
1529686.56.56.5
 
 
Juniper Junos IRB resource consumption2.55CVE-2020-1625
1529674.43.35.5
 
 
Juniper Junos Configuration File Hash log file1.70CVE-2020-1624
1529664.43.35.5
 
 
Juniper Junos Configuration File log file2.46CVE-2020-1623
1529654.43.35.5
 
 
Juniper Junos EvoSharedObjStore Hash resource control0.72CVE-2020-1622
1529644.43.35.5
 
 
Juniper Junos configd Trace Hash resource control1.73CVE-2020-1621
1529634.43.35.5
 
 
Juniper Junos configd Streamer Log Hash resource control2.55CVE-2020-1620
1529625.14.26.0
 
 
Juniper Junos Next-Generation Routing Engine input validation2.49CVE-2020-1619
1529616.77.06.3
 
 
Juniper Junos Console Port authentication2.09CVE-2020-1618
1529606.45.37.5
 
 
Juniper Junos initialization0.00CVE-2020-1617
1529595.35.35.3
 
 
Juniper JATP/vJATP SSH Service authentication0.00CVE-2020-1616
1529588.57.39.8
 
 
Juniper Junos hard-coded credentials0.28CVE-2020-1615
1529579.18.310.0
 
 
Juniper NFX250 hard-coded credentials0.00CVE-2020-1614
1529567.25.88.6
 
 
Juniper Junos BGP FlowSpec denial of service1.83CVE-2020-1613
1529536.45.37.5
 
 
Varnish Cache Proxy input validation0.09CVE-2020-11653
1529526.45.37.5
 
 
iXsystems FreeNAS authentication1.89CVE-2020-11650

Do you want to use VulDB in your project?

Use the official API to access entries easily!