CVSSv3 June 2020info

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

C3BM Index »

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

PublishedBaseVDBNVDCNAVendResVulnerabilityCTICVE
06/30/20206.54.38.8
 
 
 
TIBCO Managed File Transfer Command Center MFT Admin Service information disclosure0.00CVE-2020-9414
06/30/20205.95.56.3
 
 
 
TIBCO Managed File Transfer Command Center MFT Browser privileges management0.03CVE-2020-9413
06/30/20203.32.34.4
 
 
 
NVIDIA Virtual GPU Manager vGPU Plugin input validation0.08CVE-2020-5973
06/30/20206.25.37.1
 
 
 
NVIDIA Virtual GPU Manager vGPU Plugin release of reference0.03CVE-2020-5972
06/30/20206.55.37.8
 
 
 
NVIDIA Virtual GPU Manager vGPU Plugin out-of-bounds read0.06CVE-2020-5971
06/30/20206.25.37.1
 
 
 
NVIDIA Virtual GPU Manager vGPU Plugin input validation0.00CVE-2020-5970
06/30/20205.85.36.3
 
 
 
NVIDIA Virtual GPU Manager vGPU Plugin race condition0.00CVE-2020-5969
06/30/20206.55.37.8
 
 
 
NVIDIA Virtual GPU Manager vGPU Plugin memory corruption0.00CVE-2020-5968
06/30/20207.56.38.8
 
 
 
OCS Inventory NG CommandLine.php os command injection0.03CVE-2020-14947
06/30/20208.08.87.8
 
7.3
 
Microsoft Windows Codecs Library memory corruption0.03CVE-2020-1457
06/30/20208.08.87.8
 
7.3
 
Microsoft Windows Codecs Library memory corruption0.00CVE-2020-1425
06/30/20207.47.37.5
 
 
 
Apache SkyWalking H2/MySQL/TiDB sql injection0.00CVE-2020-9483
06/30/20206.66.37.0
 
 
 
DaView Indy/DaVa+/DaOffice JPEG Image Parser stack-based overflow0.04CVE-2020-7816
06/30/20206.75.58.0
 
 
 
Nozomi Networks OS injection0.03CVE-2020-7049
06/30/20206.45.37.5
 
 
 
xrdp-sesman Service Service Port 3350 stack-based overflow0.03CVE-2020-4044
06/30/20208.57.39.8
 
 
 
DrayTek Vigor3900/Vigor2960/Vigor300B cvmcfgupload os command injection0.03CVE-2020-15415
06/30/20205.36.34.3
 
 
 
MISP ACL Check EventsController.php privileges management0.04CVE-2020-15412
06/30/20208.57.39.8
 
 
 
MISP ACL Check AttributesController.php privileges management0.02CVE-2020-15411
06/30/20204.95.34.4
 
 
 
IObit Malware Fighter Pro Object Manager link following0.06CVE-2020-15401
06/30/20204.34.34.3
 
 
 
CakePHP CSRF Token Generator cross-site request forgery0.03CVE-2020-15400
06/30/20206.55.37.8
 
 
 
HylaFAX+/HylaFAX Enterprise hylafax privileges management0.06CVE-2020-15397
06/30/20207.87.87.8
 
 
 
HylaFAX+/HylaFAX Enterprise faxsetup Utility privileges management0.09CVE-2020-15396
06/30/20205.24.36.1
 
 
 
Nozomi Guardian Web Front End Stored cross site scripting0.03CVE-2020-15307
06/30/20207.27.17.4
 
 
 
Presto Internal API improper authorization0.04CVE-2020-15087
06/30/20206.35.86.9
 
 
 
Saleor Storefront Cache cleartext storage0.05CVE-2020-15085
06/30/20206.65.57.7
 
 
 
express-jwt improper authorization0.03CVE-2020-15084
06/30/20208.67.49.9
 
 
 
Squid Web Proxy ContentLengthInterpreter.cc request smuggling0.06CVE-2020-15049
06/30/20207.26.67.8
 
 
 
Windows Cleaning Assistant Driver AtpKrnl.sys input validation0.00CVE-2020-14957
06/30/20207.26.67.8
 
 
 
Windows Cleaning Assistant Driver AtpKrnl.sys input validation0.03CVE-2020-14956
06/30/20206.55.37.8
 
 
 
Delta Industrial Automation DOPSoft heap-based overflow0.03CVE-2020-14482
06/30/20206.45.37.5
 
 
 
Cellebrite UFED Physical Device hard-coded credentials0.00CVE-2020-14474
06/30/20205.44.36.5
 
 
 
Squid Web Proxy Synchronization pop denial of service0.00CVE-2020-14059
06/30/20206.45.37.5
 
 
 
Squid Web Proxy Certificate Validation Helper null pointer dereference0.03CVE-2020-14058
06/30/20208.88.88.8
 
 
 
Little Snitch link following0.04CVE-2020-13095
06/30/20208.57.39.8
 
 
 
Activision Infinity Ward Call of Duty Modern Warfare 2 PartyHost_HandleJoinPartyRequest buffer overflow0.03CVE-2019-20893
06/30/20206.96.37.5
 
 
 
COMMAX WallPad MySQL input validation0.09CVE-2019-19163
06/30/20205.94.77.2
 
 
 
CyMiInstaller322 ActiveX File Download privileges management0.12CVE-2019-19161
06/30/20206.45.37.5
 
 
 
Mitsubishi Engineering Software resource consumption0.09CVE-2020-5603
06/30/20207.47.37.5
 
 
 
Mitsubishi Engineering Software xml external entity reference0.04CVE-2020-5602
06/30/20207.56.38.8
 
 
 
e-Tax Reception System Extension injection0.07CVE-2020-5601

Want to stay up to date on a daily basis?

Enable the mail alert feature now!