CVSSv3 05/15/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1553413.44.32.4
 
 
Huawei P20 improper authentication0.00CVE-2020-9073
1553408.57.39.8
 
 
logkitty code injection0.05CVE-2020-8149
1553396.54.09.0
 
 
BitDefender Engine Sample Scanner cevakrnl.rv0 input validation0.00CVE-2020-8100
1553384.95.34.4
 
 
ALSong DOM-Based cross site scripting0.00CVE-2020-7809
1553374.94.35.5
 
 
apt ar/tar input validation0.00CVE-2020-3810
1553365.23.37.1
 
 
Huawei View 20/Honor 20/Honor 20 Pro/Honor Magic2 out-of-bounds read0.00CVE-2020-1808
1553354.23.15.3
 
 
KeyCloak TLS Hostname Verification certificate validation0.09CVE-2020-1758
1553335.35.35.3
 
 
iSpyConnect Agent DVR path traversal0.07CVE-2020-13093
1553328.57.39.8
 
 
scikit-learn joblib.load deserialization0.03CVE-2020-13092
1553318.57.39.8
 
 
Pandas os.system read_pickle deserialization0.06CVE-2020-13091
1553308.57.39.8
 
 
MISP-maltego privileges management0.05CVE-2020-12889
1553296.46.36.5
 
 
Linux Kernel VFIO PCI Driver exceptional condition0.00CVE-2020-12888
1553284.43.55.4
 
 
Submitty cross site scripting0.05CVE-2020-12882
1553274.22.95.5
 
 
Yaws TLS inadequate encryption0.05CVE-2020-12872
1553268.57.39.8
 
 
eQ-3 Homematic CCU2/Homematic CCU3 JSON API default permission0.07CVE-2020-12834
1553256.55.37.8
 
 
Cellebrite UFED Operating System Policy privileges management0.00CVE-2020-12798
1553245.75.36.1
 
 
Interchange Help System help.html cross site scripting0.00CVE-2020-12685
1553238.57.39.8
 
 
SecureCRT integer overflow0.05CVE-2020-12651
1553224.35.33.3
 
 
Pulseaudio Access Restriction access control0.00CVE-2020-11931
1553217.25.39.1
 
 
FreeRDP update.c integer overflow0.00CVE-2020-11526
1553207.25.39.1
 
 
FreeRDP bitmap.c out-of-bounds read0.00CVE-2020-11525
1553198.57.39.8
 
 
FreeRDP interleaved.c out-of-bounds write0.00CVE-2020-11524
1553188.57.39.8
 
 
FreeRDP region.c integer overflow0.00CVE-2020-11523
1553177.25.39.1
 
 
FreeRDP gdi.c out-of-bounds read0.00CVE-2020-11522
1553168.57.39.8
 
 
FreeRDP planar.c integer overflow0.00CVE-2020-11521
1553155.05.05.0
 
 
Ansible Engine/Ansible Tower fuse Filesystem Temporary temp file2.43CVE-2020-10744
1553146.24.38.1
 
 
Subrion CMS cross-site request forgery0.00CVE-2019-20390
1553135.75.36.1
 
 
Subrion CMS General Settings Page general Reflected cross site scripting0.00CVE-2019-20389
1553127.06.37.8
 
 
VideoLAN VLC Media Player sdl_image.c DecodeBlock off-by-one0.04CVE-2019-19721
1553118.57.39.8
 
 
D-Link DAP-1360 Telnet Service authorization0.00CVE-2019-18666
1553107.57.37.8
 
 
transmission Torrent File variant.c use after free0.00CVE-2018-10756

Do you need the next level of professionalism?

Upgrade your account now!