CVSSv3 06/15/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1567766.27.45.0
 
 
OX Guard server-side request forgery0.00CVE-2020-9427
1567755.24.36.1
 
 
OX Guard cross site scripting0.00CVE-2020-9426
1567745.95.06.8
 
 
Huawei P30/P30 Pro improper authentication0.04CVE-2020-9076
1567735.44.36.5
 
 
Huawei Secospace USG6300/Secospace USG6300E information disclosure0.00CVE-2020-9075
1567725.54.36.8
 
 
Intel Innovation Engine Control Flow Management privileges management0.08CVE-2020-8675
1567715.35.35.3
 
 
Infor AMT/ISM Subsystem out-of-bounds read0.05CVE-2020-8674
1567706.55.37.8
 
 
Webroot PKG privileges management0.00CVE-2020-5755
1567698.27.39.1
 
 
Webroot type confusion0.04CVE-2020-5754
1567687.56.38.8
 
 
Plex Media Server Access Control exposure of resource0.05CVE-2020-5742
1567675.44.26.7
 
 
Dell Endpoint Security/Endpoint Security Suite permission assignment0.00CVE-2020-5358
1567667.47.37.5
 
 
IBM Spectrum Protect Web User Interface improper authentication0.07CVE-2020-4494
1567654.23.15.3
 
 
IBM Spectrum Protect Plus Log File cleartext storage0.00CVE-2020-4477
1567645.25.64.8
 
 
IBM Spectrum Protect Plus privileges management0.07CVE-2020-4471
1567636.35.57.1
 
 
IBM Spectrum Protect Plus Administrative Console unrestricted upload0.05CVE-2020-4470
1567627.77.38.1
 
 
IBM Spectrum Protect Plus Incomplete Fix CVE-2020-4211 command injection0.00CVE-2020-4469
1567615.55.55.4
 
 
IBM Spectrum Protect Web User Interface clickjacking0.02CVE-2020-4406
1567607.47.37.5
 
 
IBM Spectrum Protect Plus hard-coded credentials0.02CVE-2020-4216
1567593.63.53.7
 
 
Dijit Editor's LinkDialog Plugin cross site scripting0.00CVE-2020-4051
1567586.55.37.8
 
 
VMware Horizon Client Folder Permission privileges management0.07CVE-2020-3961
1567575.44.36.5
 
 
Huawei FusionAccess Message input validation0.02CVE-2020-1825
1567565.54.36.8
 
 
Huawei P30 improper authentication0.05CVE-2020-1813
1567557.47.37.5
 
 
JerryScript Garbage Collector ecma-container-object.c ecma_gc_set_object_visited memory corruption0.00CVE-2020-14163
1567547.56.38.8
 
 
ConnectWise Automate API sql injection0.11CVE-2020-14159
1567537.56.38.8
 
 
OpenBMC phosphor-host-ipmid File Permission passwd_mgr.cpp default permission0.06CVE-2020-14156
1567528.57.39.8
 
 
PCRE libpcre integer overflow0.00CVE-2020-14155
1567514.95.04.8
 
 
Mutt GnuTLS improper authentication0.05CVE-2020-14154
1567506.25.37.1
 
 
libjpeg jdhuff.c out-of-bounds read0.04CVE-2020-14153
1567495.23.37.1
 
 
libjpeg jmemnobs.c jpeg_mem_available resource consumption0.06CVE-2020-14152
1567487.17.17.1
 
 
libjpeg EOF rdtarga.c read_*_pixel unknown vulnerability0.06CVE-2020-14151
1567476.45.37.5
 
 
GNU Bison denial of service0.05CVE-2020-14150
1567466.45.37.5
 
 
uftpd ftpcmd.c handle_CWD null pointer dereference0.04CVE-2020-14149
1567457.47.37.5
 
 
ngIRCd IRC_NJOIN out-of-bounds read0.02CVE-2020-14148
1567448.48.38.6
 
 
Redis lua_struct.c getnum integer overflow0.05CVE-2020-14147
1567434.43.55.4
 
 
KumbiaPHP Development Mode kumbia cross site scripting0.07CVE-2020-14146
1567427.56.38.8
 
 
TRENDnet TEW-827DRU SSI Binary apply.cgi st_dev_rconnect out-of-bounds write0.02CVE-2020-14076
1567418.57.39.8
 
 
Cotecmi SOKKIA GNR5 Vanguard WEB sql injection0.03CVE-2020-14054
1567408.57.39.8
 
 
janus-gateway utils.c janus_get_codec_from_pt buffer overflow0.04CVE-2020-14034
1567398.57.39.8
 
 
janus-gateway janus_streaming.c janus_streaming_rtsp_parse_sdp buffer overflow0.05CVE-2020-14033
1567388.57.39.8
 
 
Lansweeper authorization0.05CVE-2020-14011
1567375.45.35.5
 
 
libEMF libemf.cpp ScaleViewPortExtEx integer overflow0.00CVE-2020-13999

Interested in the pricing of exploits?

See the underground prices here!