CVSSv3 06/22/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1571624.84.35.4
 
 
Fortinet FortiWLC ESS Profile/Radius Profile Stored cross site scriptingCVE-2020-9288
1571617.87.87.8
 
 
Google Cloud Platform guest-oslogin compute.osLogin privilege escalationCVE-2020-8933
1571607.87.87.8
 
 
Google Cloud Platform guest-oslogin compute.osLogin privilege escalationCVE-2020-8907
1571596.76.76.7
 
 
Google Cloud Platform guest-oslogin compute.osLogin privilege escalationCVE-2020-8903
1571587.56.38.8
 
 
BitDefender Total Security 2020 Safepay Browser privilege escalationCVE-2020-8102
1571574.64.05.3
 
 
McAfee Advanced Threat Defense Access Control information disclosureCVE-2020-7262
1571563.73.78.1
 
 
Fortinet FortiDeceptor Session Expiration weak authenticationCVE-2020-6644
1571554.03.54.6
 
 
W3C CSS Validator URI cross site scriptingCVE-2020-4070
1571546.36.36.3
 
 
APNSwift APNSwiftSigner.sign memory corruptionCVE-2020-4068
1571534.34.73.8
 
 
Limdu trainBatch command injectionCVE-2020-4066
1571527.66.68.7
 
 
CyberArk Conjur OSS Helm Chart Role-Based Access Control privilege escalationCVE-2020-4062
1571515.36.54.1
 
 
LoRa Basics Station Use-After-Free memory corruptionCVE-2020-4060
1571504.76.33.1
 
 
FreeRDP Out-of-Bounds memory corruptionCVE-2020-4033
1571493.13.13.1
 
 
FreeRDP relax-order-checks update_recv_secondary_order memory corruptionCVE-2020-4032
1571485.57.43.5
 
 
FreeRDP Compatibility Mode relax-order-checks gdi_SelectObject memory corruptionCVE-2020-4031
1571475.57.43.5
 
 
FreeRDP TrioParse Integer Overflow memory corruptionCVE-2020-4030
1571465.55.57.8
 
 
Qualcomm Snapdragon Auto memory corruptionCVE-2020-3676
1571455.55.57.8
 
 
Qualcomm Snapdragon Auto memory corruptionCVE-2020-3665
1571445.55.59.8
 
 
Qualcomm Snapdragon Auto memory corruptionCVE-2020-3663
1571435.55.59.8
 
 
Qualcomm Snapdragon Auto eac3 Header memory corruptionCVE-2020-3662
1571425.55.59.8
 
 
Qualcomm Snapdragon Auto MP4 File memory corruptionCVE-2020-3661
1571413.53.59.8
 
 
Qualcomm Snapdragon Auto MP4 File NULL Pointer Dereference denial of serviceCVE-2020-3660
1571403.53.59.1
 
 
Qualcomm Snapdragon Auto MP4 File NULL Pointer Dereference denial of serviceCVE-2020-3658
1571395.55.57.8
 
 
Qualcomm Snapdragon Consumer IOT/Snapdragon Mobile Use-After-Free memory corruptionCVE-2020-3642
1571385.55.57.8
 
 
Qualcomm Snapdragon Auto Stack-based memory corruptionCVE-2020-3635
1571375.55.59.8
 
 
Qualcomm Snapdragon Consumer IOT/Snapdragon Mobile Logging Application privilege escalationCVE-2020-3628
1571365.55.57.8
 
 
Qualcomm Snapdragon Auto API privilege escalationCVE-2020-3626
1571355.55.59.8
 
 
Qualcomm Snapdragon Compute memory corruptionCVE-2020-3614
1571345.55.57.8
 
 
Qualcomm Snapdragon Compute Protection Mechanism Double-Free memory corruptionCVE-2020-3613
1571336.97.46.4
 
 
KeyCloak Authorization URL privilege escalationCVE-2020-1727
1571324.44.47.1
 
 
IObit Advanced SystemCare Free Clean & Optimize denial of serviceCVE-2020-14990
1571315.55.59.8
 
 
Chocolate Doom/Crispy Doom Stack-based memory corruptionCVE-2020-14983
1571305.55.55.9
 
 
ThreatTrack VIPRE Password Vault App SSL Certificate Validator weak authenticationCVE-2020-14981
1571295.75.65.9
 
 
Sophos Secure Email App SSL Certificate Validator weak authenticationCVE-2020-14980
1571285.24.36.1
 
 
webTareas login.php loginForm cross site scriptingCVE-2020-14973
1571278.57.39.8
 
 
Sourcecodester Pisay Online E-Learning System Admin Login-Portal Code Execution sql injectionCVE-2020-14972
1571263.53.57.5
 
 
MISP ACL Lookup Attribute.php information disclosureCVE-2020-14969
1571254.24.29.8
 
 
jsrsasign Package RSASSA-PSS weak authenticationCVE-2020-14968
1571244.84.89.8
 
 
jsrsasign Package RSA PKCS1 weak authenticationCVE-2020-14967
1571235.55.57.5
 
 
jsrsasign Package ECDSA Signature Integer memory corruptionCVE-2020-14966
1571224.34.35.4
 
 
Final Tiles Gallery Plugin admin-ajax.php cross site scriptingCVE-2020-14962
1571215.55.55.3
 
 
concrete5 Sort unknown vulnerabilityCVE-2020-14961
1571205.94.77.2
 
 
php-fusion comments.php sql injectionCVE-2020-14960
1571194.34.35.4
 
 
Easy Testimonials Plugin post.php cross site scriptingCVE-2020-14959
1571185.55.54.3
 
 
Global RADAR BSA Radar Surveillance Module downloadFile.ashx directory traversalCVE-2020-14946
1571175.55.58.8
 
 
Global RADAR BSA Radar privilege escalationCVE-2020-14945
1571165.55.59.8
 
 
Global RADAR BSA Radar privilege escalationCVE-2020-14944
1571153.53.55.4
 
 
Global RADAR BSA Radar Update User Profile Stored cross site scriptingCVE-2020-14943
1571148.48.38.6
 
 
ZyXEL Armor X1 WAP6806 directory traversalCVE-2020-14461
1571137.26.38.2
 
 
WebFOCUS Business Intelligence WFServlet.cfg XML External EntityCVE-2020-14204

Want to stay up to date on a daily basis?

Enable the mail alert feature now!