CVSSv3 05/20/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1557937.56.38.8
 
 
Apple iTunes WebKit memory corruption0.05CVE-2020-9803
1557925.24.36.1
 
 
Apple iTunes WebKit cross site scripting0.00CVE-2020-9843
1557918.57.39.8
 
 
Apple iTunes WebKit privileges management0.00CVE-2020-9850
1557907.56.38.8
 
 
Apple iTunes WebKit memory corruption0.00CVE-2020-9807
1557897.56.38.8
 
 
Apple iTunes WebKit memory corruption0.00CVE-2020-9806
1557887.56.38.8
 
 
Apple iTunes WebKit type confusion0.00CVE-2020-9800
1557877.56.38.8
 
 
Apple iTunes WebKit privileges management0.00CVE-2020-9802
1557865.24.36.1
 
 
Apple iTunes WebKit Universal cross site scripting0.00CVE-2020-9805
1557856.75.38.1
 
 
Apple iTunes SQLite out-of-bounds read0.00CVE-2020-9794
1557847.06.37.8
 
 
Apple iTunes ImageIO out-of-bounds read0.00CVE-2020-3878
1557837.56.38.8
 
 
Apple iTunes ImageIO out-of-bounds write0.00CVE-2020-9790
1557827.56.38.8
 
 
Apple iTunes ImageIO out-of-bounds write0.08CVE-2020-9789
1557808.810.07.5
 
 
Apple iOS/iPadOS Wi-Fi double free0.08CVE-2020-9844
1557796.04.37.8
 
 
Apple iOS/iPadOS WebRTC use after free0.04CVE-2019-2050
1557787.56.38.8
 
 
Apple iOS/iPadOS WebKit type confusion0.00CVE-2020-9800
1557777.56.38.8
 
 
Apple iOS/iPadOS WebKit memory corruption0.05CVE-2020-9807
1557767.56.38.8
 
 
Apple iOS/iPadOS WebKit memory corruption0.96CVE-2020-9806
1557757.56.38.8
 
 
Apple iOS/iPadOS WebKit memory corruption1.15CVE-2020-9803
1557745.24.36.1
 
 
Apple iOS/iPadOS WebKit cross site scripting0.78CVE-2020-9843
1557738.57.39.8
 
 
Apple iOS/iPadOS WebKit privileges management1.05CVE-2020-9850
1557727.56.38.8
 
 
Apple iOS/iPadOS WebKit privileges management0.09CVE-2020-9802
1557715.24.36.1
 
 
Apple iOS/iPadOS WebKit Universal cross site scripting0.04CVE-2020-9805
1557703.52.44.6
 
 
Apple iOS/iPadOS USB Audio input validation0.97CVE-2020-9792
1557696.15.37.0
 
 
Apple iOS/iPadOS System Preferences race condition0.06CVE-2020-9839
1557686.75.38.1
 
 
Apple iOS/iPadOS SQLite out-of-bounds read0.09CVE-2020-9794
1557676.55.37.8
 
 
Apple iOS/iPadOS Sandbox privileges management1.24CVE-2020-9825
1557662.42.42.4
 
 
Apple iOS/iPadOS Notifications Lockscreen information disclosure0.05CVE-2020-9848
1557656.96.37.5
 
 
Apple iOS/iPadOS Messages privileges management0.11CVE-2020-9823
1557647.56.38.8
 
 
Apple iOS/iPadOS Mail out-of-bounds write1.16CVE-2020-9818
1557635.36.34.3
 
 
Apple iOS/iPadOS Mail memory corruption1.18CVE-2020-9819
1557624.43.35.5
 
 
Apple iOS/iPadOS Kernel information disclosure1.10CVE-2020-9809
1557618.38.87.8
 
 
Apple iOS/iPadOS Kernel memory corruption0.00CVE-2020-9814
1557608.38.87.8
 
 
Apple iOS/iPadOS Kernel memory corruption0.90CVE-2020-9813
1557594.43.35.5
 
 
Apple iOS/iPadOS Kernel information disclosure0.20CVE-2020-9812
1557584.43.35.5
 
 
Apple iOS/iPadOS Kernel information disclosure0.00CVE-2020-9811
1557578.08.87.1
 
 
Apple iOS/iPadOS Kernel memory corruption0.00CVE-2020-9808
1557568.38.87.8
 
 
Apple iOS/iPadOS Kernel use after free0.06CVE-2020-9795
1557558.38.87.8
 
 
Apple iOS/iPadOS Kernel integer overflow0.27CVE-2020-9852
1557544.43.35.5
 
 
Apple iOS/iPadOS Kernel information disclosure0.23CVE-2020-9797
1557538.38.87.8
 
 
Apple iOS/iPadOS Kernel memory corruption0.00CVE-2020-9821
1557526.45.37.5
 
 
Apple iOS/iPadOS IPSec out-of-bounds read1.02CVE-2020-9837
1557517.56.38.8
 
 
Apple iOS/iPadOS ImageIO out-of-bounds write0.13CVE-2020-9790
1557507.56.38.8
 
 
Apple iOS/iPadOS ImageIO out-of-bounds write0.00CVE-2020-9789
1557497.06.37.8
 
 
Apple iOS/iPadOS ImageIO out-of-bounds read0.86CVE-2020-3878
1557487.06.37.8
 
 
Apple iOS/iPadOS FontParser out-of-bounds write0.14CVE-2020-9816
1557477.47.37.5
 
 
Apple iOS/iPadOS File System privileges management0.27CVE-2020-9820
1557465.86.35.3
 
 
Apple iOS/iPadOS FaceTime input validation1.19CVE-2020-9835
1557455.44.36.5
 
 
Apple iOS/iPadOS CoreText input validation1.01CVE-2020-9829
1557448.57.39.8
 
 
Apple iOS/iPadOS Bluetooth out-of-bounds read0.09CVE-2020-9838
1557434.72.96.5
 
 
Apple iOS/iPadOS Bluetooth PRNG weak prng0.07CVE-2020-6616

Do you want to use VulDB in your project?

Use the official API to access entries easily!