CVSSv3 06/04/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1594363.33.3
 
 
 
Microsoft Windows mshta.exe xml external entity reference0.06
1562113.32.44.3
 
 
Athom Homey/Homey Pro Network Configuration cleartext storage0.00CVE-2020-9462
1562106.45.37.5
 
 
url-regex Regular Expression resource consumption0.00CVE-2020-7661
1562096.45.37.5
 
 
MQTT Protocol resource consumption0.00CVE-2020-13849
1562086.45.37.5
 
 
Portable UPnP SDK SSDP Message service_table.c FindServiceEventURLPath null pointer dereference0.00CVE-2020-13848
1562023.94.33.5
 
 
Samsung Mobile Devices DeX Lockscreen improper authentication1.78CVE-2020-13838
1562013.94.33.5
 
 
Samsung Mobile Devices Lockscreen improper authentication1.73CVE-2020-13837
1562006.45.37.5
 
 
Samsung Mobile Devices HWRResProvider path traversal1.78CVE-2020-13836
1561996.73.79.8
 
 
Samsung Mobile Devices Gatekeeper Trustlet insufficiently protected credentials1.84CVE-2020-13835
1561987.47.37.5
 
 
Samsung Mobile Devices Secure Folder authorization1.73CVE-2020-13834
1561978.27.39.1
 
 
Samsung Mobile Devices System Area link following1.68CVE-2020-13833
1561968.57.39.8
 
 
Samsung Mobile Devices TEEGRIS memory corruption1.63CVE-2020-13832
1561958.57.39.8
 
 
Samsung Mobile Devices Trustonic Kinibi memory corruption1.57CVE-2020-13831
1561946.45.37.5
 
 
Samsung Mobile Devices One UI HOME Log information disclosure1.31CVE-2020-13830
1561937.47.37.5
 
 
Samsung Mobile Devices SEAndroid Protection Mechanism privileges management1.47CVE-2020-13829
1561925.94.37.5
 
 
Foxit Reader/PhantomPDF resource consumption1.70CVE-2020-13815
1561918.06.39.8
 
 
Foxit Reader/PhantomPDF Dictionary use after free1.44CVE-2020-13814
1561906.55.37.8
 
 
Foxit Studio Photo DLL FoxitStudioPhoto366_3.6.6.916.exe untrusted search path1.39CVE-2020-13813
1561896.55.37.8
 
 
Foxit Studio Photo DLL untrusted search path1.49CVE-2020-13812
1561887.06.37.8
 
 
Foxit Studio Photo out-of-bounds write1.65CVE-2020-13811
1561874.63.26.0
 
 
QEMU Recursion ati.c ati_mm_write infinite loop1.28CVE-2020-13800
1561865.45.35.5
 
 
QEMU pci.c out-of-bounds read1.49CVE-2020-13791
1561858.57.39.8
 
 
MiniShare out-of-bounds write0.00CVE-2020-13768
1561846.55.37.8
 
 
QEMU loader.c rom_copy memory corruption1.52CVE-2020-13765
1561838.57.39.8
 
 
PostgreSQL JDBC Driver xml external entity reference1.83CVE-2020-13692
1561825.24.36.1
 
 
Pydio Cells cross site scripting0.00CVE-2020-12853
1561815.54.36.8
 
 
Pydio Cells Software Update input validation0.00CVE-2020-12852
1561807.26.38.1
 
 
Pydio Cells Web Application information disclosure0.00CVE-2020-12851
1561795.94.77.2
 
 
Pydio Cells Web Application input validation0.00CVE-2020-12847
1561785.44.36.5
 
 
Castel NextGen DVR Web Interface __RequestVerificationToken cross-site request forgery0.00CVE-2020-11682
1561776.24.38.1
 
 
Castel NextGen DVR SMTP Server Credentials insufficiently protected credentials0.09CVE-2020-11681
1561766.46.36.5
 
 
Castel NextGen DVR Authorization authorization0.00CVE-2020-11680
1561757.56.38.8
 
 
Castel NextGen DVR privileges management0.00CVE-2020-11679
1561744.43.35.5
 
 
QEMU PAuth Support information disclosure1.60CVE-2020-10702
1561737.47.37.5
 
 
Foxit Reader/PhantomPDF Signature Validation signature verification1.65CVE-2019-20837
1561727.57.57.5
 
 
Foxit Reader/PhantomPDF Cloud Credential information disclosure1.86CVE-2019-20836
1561714.34.34.3
 
 
Foxit Reader/PhantomPDF Homograph unknown vulnerability1.65CVE-2019-20835
1561707.47.37.5
 
 
Foxit PhantomPDF Signature Validation signature verification1.81CVE-2019-20834
1561697.57.57.5
 
 
Foxit PhantomPDF Cloud Credential insufficiently protected credentials1.86CVE-2019-20833
1561684.34.34.3
 
 
Foxit PhantomPDF Homograph unknown vulnerability1.81CVE-2019-20832
1561676.45.37.5
 
 
Foxit Reader/PhantomPDF 3D Plugin Beta denial of service2.20CVE-2019-20831
1561668.06.39.8
 
 
Foxit Reader/PhantomPDF out-of-bounds write2.15CVE-2019-20830
1561655.94.37.5
 
 
Foxit Reader/PhantomPDF FXSYS_wcslen null pointer dereference1.92CVE-2019-20829
1561647.47.37.5
 
 
Foxit Reader/PhantomPDF Field AP buffer overflow1.76CVE-2019-20828
1561637.04.39.8
 
 
Foxit Reader/PhantomPDF out-of-bounds write1.70CVE-2019-20827
1561625.94.37.5
 
 
Foxit Reader/PhantomPDF null pointer dereference1.86CVE-2019-20826
1561618.06.39.8
 
 
Foxit PhantomPDF out-of-bounds write1.70CVE-2019-20825
1561605.94.37.5
 
 
Foxit PhantomPDF FXSYS_wcslen null pointer dereference1.62CVE-2019-20824
1561596.96.37.5
 
 
Foxit PhantomPDF Field AP buffer overflow1.31CVE-2019-20823
1561588.06.39.8
 
 
Foxit Reader/PhantomPDF 3D Plugin Beta out-of-bounds write1.71CVE-2019-20822

Want to stay up to date on a daily basis?

Enable the mail alert feature now!