CVSSv3 04/28/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1545426.46.36.5
 
 
NiFi Registry Logout session expiration0.00CVE-2020-9482
1545416.85.68.1
 
 
fun-map Prototype resource consumption0.00CVE-2020-7644
1545405.35.35.3
 
 
FreeBSD TCP SYN-ACK Kernel Memory information disclosure0.07CVE-2020-7451
1545398.57.39.8
 
 
Ivanti Avalanche Apache HTTP Server sql injection0.06CVE-2020-12442
1545384.43.55.4
 
 
php-fusion Event banners.php cross site scripting0.04CVE-2020-12438
1545375.44.36.5
 
 
libvirt qemu_driver.c qemuDomainGetStatsIOThread memory leak0.05CVE-2020-12430
1545368.57.39.8
 
 
Online Course Registration change-password.php sql injection0.08CVE-2020-12429
1545354.43.55.4
 
 
Open-AudIT cross site scripting0.00CVE-2020-12261
1545346.45.37.5
 
 
OpenLDAP slapd filter.c resource consumption0.04CVE-2020-12243
1545337.57.47.7
 
 
Tiny File Manager Ajax File Copy path traversal0.07CVE-2020-12103
1545326.35.07.7
 
 
Tiny File Manager Ajax path traversal0.09CVE-2020-12102
1545315.95.86.1
 
 
Electron Cash SLP Edition Mint Tool privileges management0.00CVE-2020-11014
1545307.47.37.5
 
 
JSON Gem Object input validation0.05CVE-2020-10663
1545296.45.37.5
 
 
Ignition 8 Gateway Logging Route access control0.00CVE-2020-10641
1545288.57.39.8
 
 
OpenThread GeneratePskc out-of-bounds write0.00CVE-2019-20791
1545275.45.35.5
 
 
FreeBSD ioctl Command input validation0.00CVE-2019-15877
1545265.45.35.5
 
 
FreeBSD ioctl Command privileges management0.00CVE-2019-15876
1545254.84.35.4
 
 
Sales Force Assistant cross site scripting0.00CVE-2020-5570
1545244.34.34.3
 
 
IBM WebSphere Application Server/Liberty information disclosure0.09CVE-2020-4329
1545233.42.44.5
 
 
OTRS Certificates Download insertion of sensitive information into sent data0.00CVE-2020-1774
1545227.97.38.6
 
 
Undertow AJP Connector improper authorization0.03CVE-2020-1745
1545215.36.34.3
 
 
Octopus Deploy TaskView Permission information disclosure0.00CVE-2020-12286
1545208.57.39.8
 
 
FFmpeg cbs_jpeg.c cbs_jpeg_split_fragment out-of-bounds write0.05CVE-2020-12284
1545197.56.38.8
 
 
Open-AudIT exec injection0.00CVE-2020-12078
1545184.43.55.4
 
 
Hashicorp Nomad/Nomad Enterprise Web UI cross site scripting0.06CVE-2020-10944
1545174.43.55.4
 
 
Lexmark Printer cross site scripting0.05CVE-2020-10094
1545164.43.55.4
 
 
Lexmark Pro910 Inkjet cross site scripting0.00CVE-2020-10093
1545157.56.38.8
 
 
Netgear JNR1010v2/JWNR2010v5/WNR1000v4/WNR2020/WNR2050 improper authentication0.00CVE-2018-21226
1545146.15.56.8
 
 
Netgear R9000 command injection0.00CVE-2018-21225
1545137.56.38.8
 
 
Netgear WNR2000v5 memory corruption0.00CVE-2018-21224
1545127.56.38.8
 
 
Netgear WNR2000v5 memory corruption0.00CVE-2018-21223
1545117.56.38.8
 
 
Netgear WNR2000v5 memory corruption0.00CVE-2018-21222
1545107.56.38.8
 
 
Netgear D3600/D6000/R9000 memory corruption0.00CVE-2018-21221
1545097.56.38.8
 
 
Netgear WNR2000v5 memory corruption1.41CVE-2018-21220
1545087.56.38.8
 
 
Netgear WNR2000v5 memory corruption0.00CVE-2018-21219
1545077.56.38.8
 
 
Netgear WNR2000v5 memory corruption0.00CVE-2018-21218
1545067.56.38.8
 
 
Netgear D3600/D6000/D6100/R6100 memory corruption0.00CVE-2018-21217
1545057.56.38.8
 
 
Netgear D3600/D6000/D6100/R6100 memory corruption0.00CVE-2018-21216
1545047.56.38.8
 
 
Netgear WN3100RPv2 memory corruption0.07CVE-2018-21215
1545037.56.38.8
 
 
Netgear WN3100RPv2 memory corruption0.00CVE-2018-21214
1545027.56.38.8
 
 
Netgear WNDR4500v3 memory corruption1.49CVE-2018-21213
1545017.56.38.8
 
 
Netgear WNDR4500v3 memory corruption0.00CVE-2018-21212
1545007.56.38.8
 
 
Netgear WNR2000v5 memory corruption0.88CVE-2018-21211
1544997.56.38.8
 
 
Netgear WNDR4500v3 memory corruption0.08CVE-2018-21210
1544984.44.14.8
 
 
Netgear WNR2050 Reflected cross site scriting0.00CVE-2018-21209
1544977.56.38.8
 
 
Netgear D6100/R6100/R7500v2/WNDR4300v2/WNDR4500v3 command injection0.07CVE-2018-21208
1544967.56.38.8
 
 
Netgear WNDR4500v3 stack-based overflow0.08CVE-2018-21207
1544957.56.38.8
 
 
Netgear WNDR4500v3 stack-based overflow0.00CVE-2018-21206
1544947.56.38.8
 
 
Netgear WNDR4500v3 stack-based overflow0.14CVE-2018-21205
1544937.56.38.8
 
 
Netgear WNDR4500v3 stack-based overflow1.28CVE-2018-21204

Do you know our Splunk app?

Download it now for free!