CVSSv3 05/14/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1553095.13.76.5
 
 
Spring Security CBC Mode weak encryptionCVE-2020-5408
1553088.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4468
1553078.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4467
1553068.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4422
1553055.86.35.3
 
 
IBM WebSphere Application Server Server-Side Request ForgeryCVE-2020-4365
1553048.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4343
1553034.34.34.3
 
 
IBM Sterling B2B Integrator Standard Edition information disclosureCVE-2020-4299
1553028.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4288
1553018.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4287
1553008.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4285
1552998.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4266
1552987.78.07.3
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4265
1552977.87.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4264
1552968.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4263
1552958.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4262
1552948.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4261
1552936.46.36.5
 
 
IBM Sterling File Gateway privilege escalationCVE-2020-4259
1552928.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4258
1552918.38.87.8
 
 
IBM i2 Intelligent Analyis Platform memory corruptionCVE-2020-4257
1552905.05.34.7
 
 
Apache Flink JMXRMI Registry Man-in-the-Middle privilege escalationCVE-2020-1960
1552897.25.39.1
 
 
Apache ant Temp Directory Code Injection privilege escalationCVE-2020-1945
1552885.24.36.1
 
 
Apache ActiveMQ Webconsole Admin GUI cross site scriptingCVE-2020-1941
1552876.45.37.5
 
 
Veritas APTARE information disclosureCVE-2020-12877
1552865.35.35.3
 
 
Veritas APTARE information disclosureCVE-2020-12876
1552855.34.36.3
 
 
Veritas APTARE information disclosureCVE-2020-12875
1552846.97.36.5
 
 
Veritas APTARE weak authenticationCVE-2020-12874
1552835.24.36.1
 
 
Progress MOVEit Automation Web Admin Application cross site scriptingCVE-2020-12677
1552826.97.36.5
 
 
nginx Request Smuggling privilege escalationCVE-2020-12440
1552816.97.36.5
 
 
CODESYS Development System privilege escalationCVE-2020-12068
1552805.65.55.7
 
 
Opto 22 SoftPAC Signature privilege escalationCVE-2020-12046
1552797.78.86.5
 
 
Opto 22 SoftPAC privilege escalationCVE-2020-12042
1552788.57.39.8
 
 
Apache Camel Netty Deserialization privilege escalationCVE-2020-11973
1552778.57.39.8
 
 
Apache Camel RabbitMQ Deserialization privilege escalationCVE-2020-11972
1552767.57.57.5
 
 
Apache Camel JMX privilege escalationCVE-2020-11971
1552756.55.37.8
 
 
Fazecast jSerialComm DLL privilege escalationCVE-2020-10626
1552748.06.39.8
 
 
Opto 22 SoftPAC weak authenticationCVE-2020-10620
1552737.56.38.8
 
 
Opto 22 SoftPAC DLL privilege escalationCVE-2020-10616
1552727.76.39.1
 
 
Opto 22 SoftPAC Service Port 22000 privilege escalationCVE-2020-10612
1552718.57.39.8
 
 
Google Android Airbrush FW memory corruptionCVE-2020-0221
1552706.05.36.7
 
 
Google Android msm-cirrus-playback.c crus_afe_callback memory corruptionCVE-2020-0220
1552696.55.37.8
 
 
Google Android psi.c psi_write memory corruptionCVE-2020-0110
1552686.55.37.8
 
 
Google Android Permission Check NotificationManagerService.java simulatePackageSuspendBroadcast privilege escalationCVE-2020-0109
1552674.43.35.5
 
 
Google Android SDK Version Check PhoneInterfaceManager.java getCellLocation information disclosureCVE-2020-0106
1552665.35.37.8
 
 
Google Android Permission Check key_store_service.cpp onKeyguardVisibilityChanged privilege escalationCVE-2020-0105
1552654.43.35.5
 
 
Google Android KeyguardStateMonitor.java onShowingStateChanged information disclosureCVE-2020-0104
1552648.57.39.8
 
 
Google Android a2dp_aac_decoder.cc a2dp_aac_decoder_cleanup memory corruptionCVE-2020-0103
1552636.55.37.8
 
 
Google Android gatt_server.cc SendResponse memory corruptionCVE-2020-0102
1552624.43.35.5
 
 
Google Android ICrypto.cpp onTransact information disclosureCVE-2020-0101
1552614.43.35.5
 
 
Google Android IHDCP.cpp onTransact information disclosureCVE-2020-0100
1552606.55.37.8
 
 
Google Android ActivityStack.java navigateUpToLocked privilege escalationCVE-2020-0098

Might our Artificial Intelligence support you?

Check our Alexa App!