CVSSv3 04/14/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1532897.36.37.87.8
 
Microsoft Windows Work Folder Service privileges management0.02CVE-2020-1094
1532884.83.56.1
 
 
Microsoft Dynamics 365 cross site scripting0.05CVE-2020-1050
1532874.43.55.4
 
 
Microsoft Dynamics 365 cross site scripting0.01CVE-2020-1049
1532867.36.37.87.8
 
Microsoft Windows Connected User Experiences/Telemetry Service privileges management0.02CVE-2020-1029
1532857.55.39.8
 
 
Microsoft Research JavaScript Cryptography Library ECC calculation0.01CVE-2020-1026
1532847.36.37.87.8
 
Microsoft Windows Adobe Font Manager Library input validation0.02CVE-2020-1020
1532837.06.37.8
 
 
Microsoft RMS Sharing for Mac privileges management0.04CVE-2020-1019
1532826.45.37.5
 
 
Microsoft Dynamics NAV information disclosure0.01CVE-2020-1018
1532817.06.37.87.0
 
Microsoft Windows Push Notification Service privileges management0.05CVE-2020-1017
1532805.14.35.55.5
 
Microsoft Windows Push Notification Service information disclosure0.04CVE-2020-1016
1532797.36.37.87.8
 
Microsoft Windows User-Mode Power Service privileges management0.05CVE-2020-1015
1532787.36.37.87.8
 
Microsoft Windows Update Client privileges management0.04CVE-2020-1014
1532777.36.37.87.8
 
Microsoft Windows System Assessment Tool privileges management0.02CVE-2020-1011
1532767.05.37.87.8
 
Microsoft Windows Store Install Service privileges management0.00CVE-2020-1009
1532757.06.37.87.0
 
Microsoft Windows JET Database Engine memory corruption0.01CVE-2020-1008
1532745.14.35.55.5
 
Microsoft Windows Kernel information disclosure0.01CVE-2020-1007
1532737.36.37.87.8
 
Microsoft Windows Push Notification Service privileges management0.01CVE-2020-1006
1532728.18.87.87.8
 
Microsoft Windows Kernel privileges management0.02CVE-2020-1003
1532716.25.47.1
 
 
Microsoft Forefront Endpoint Protection MpSigStub.exe privileges management0.01CVE-2020-1002
1532707.36.37.87.8
 
Microsoft Windows Notification Service privileges management0.05CVE-2020-1001
1532698.18.87.87.8
 
Microsoft Windows Kernel privileges management0.05CVE-2020-1000
1532687.06.37.87.0
 
Microsoft Windows JET Database Engine memory corruption0.02CVE-2020-0999
1532677.87.87.87.8
 
Microsoft Windows Update Stack privileges management0.00CVE-2020-0996
1532667.06.37.87.0
 
Microsoft Windows JET Database Engine memory corruption0.05CVE-2020-0995
1532657.06.37.87.0
 
Microsoft Windows JET Database Engine memory corruption0.05CVE-2020-0994
1532645.84.36.56.5
 
Microsoft Windows DNS resource consumption0.00CVE-2020-0993
1532637.06.37.87.0
 
Microsoft Windows JET Database Engine memory corruption0.04CVE-2020-0992
1532627.06.37.8
 
 
Microsoft Office memory corruption0.02CVE-2020-0991
1532617.06.37.87.0
 
Microsoft Windows JET Database Engine memory corruption0.04CVE-2020-0988
1532605.14.35.55.5
 
Microsoft Windows Graphics Component information disclosure0.01CVE-2020-0987
1532597.36.37.87.8
 
Microsoft Windows Update Stack privileges management0.05CVE-2020-0985
1532586.55.37.8
 
 
Microsoft AutoUpdate for Mac privileges management0.00CVE-2020-0984
1532577.36.37.87.8
 
Microsoft Windows privileges management0.06CVE-2020-0983
1532565.14.35.55.5
 
Microsoft Windows Graphics Component information disclosure0.02CVE-2020-0982
1532557.16.38.86.3
 
Microsoft Windows Token Security Feature injection0.05CVE-2020-0981
1532547.06.37.8
 
 
Microsoft Office/SharePoint/Word memory corruption0.00CVE-2020-0980
1532537.56.38.8
 
 
Microsoft Office 365 ProPlus Excel memory corruption0.02CVE-2020-0979
1532524.43.55.4
 
 
Microsoft SharePoint Enterprise Server cross site scripting0.01CVE-2020-0978
1532514.43.55.4
 
 
Microsoft SharePoint Enterprise Server input validation0.04CVE-2020-0977
1532504.43.55.4
 
 
Microsoft SharePoint Enterprise Server/SharePoint Foundation input validation0.02CVE-2020-0976

Do you know our Splunk app?

Download it now for free!