CVSSv3 07/14/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCVE
1580725.55.59.8
 
 
Netflix Titus Java Bean Validation Code privilege escalationCVE-2020-9297
1580717.37.39.8
 
 
Siemens LOGO! 8 BM Web Server Code Execution memory corruptionCVE-2020-7593
1580703.13.16.5
 
 
Siemens SIMATIC HMI Basic Panel weak encryptionCVE-2020-7592
1580693.53.55.3
 
 
Siemens Opcenter Execution Discrete Restart denial of serviceCVE-2020-7588
1580683.53.58.2
 
 
Siemens Opcenter Execution Discrete Restart denial of serviceCVE-2020-7587
1580673.53.57.5
 
 
Siemens SIMATIC S7-200 SMART CPU Crash denial of serviceCVE-2020-7584
1580667.87.86.7
 
 
Siemens Opcenter Execution Discrete privilege escalationCVE-2020-7581
1580655.55.58.1
 
 
Siemens Camstar Enterprise Platform privilege escalationCVE-2020-7578
1580646.36.38.1
 
 
Siemens Camstar Enterprise Platform sql injectionCVE-2020-7577
1580633.53.55.4
 
 
Siemens Camstar Enterprise Platform Stored cross site scriptingCVE-2020-7576
1580627.56.38.8
 
 
SAP Disclosure Management Session Expiration weak authenticationCVE-2020-6292
1580617.56.38.8
 
 
SAP Disclosure Management Session Expiration weak authenticationCVE-2020-6291
1580606.36.36.3
 
 
SAP Disclosure Management Session Fixation weak authenticationCVE-2020-6290
1580594.34.34.3
 
 
SAP Disclosure Management cross site request forgeryCVE-2020-6289
1580585.35.35.3
 
 
SAP NetWeaver AS JAVA LM Configuration Wizard directory traversalCVE-2020-6286
1580576.35.07.7
 
 
SAP NetWeaver XML Toolkit for JAVA information disclosureCVE-2020-6285
1580567.18.35.8
 
 
SAP NetWeaver AS JAVA Server-Side Request ForgeryCVE-2020-6282
1580555.44.76.1
 
 
SAP Business Intelligence Platform Reflected cross site scriptingCVE-2020-6281
1580542.72.72.7
 
 
SAP NetWeaver/ABAP Platform information disclosureCVE-2020-6280
1580534.74.15.4
 
 
SAP Business Intelligence Platform Image Upload Stored cross site scriptingCVE-2020-6278
1580525.44.76.1
 
 
SAP Business Intelligence Platform cross site scriptingCVE-2020-6276
1580514.84.35.4
 
 
SAP Disclosure Management Cookie httponly information disclosureCVE-2020-6267
1580506.74.78.8
 
 
Dell EMC OpenManage Integration Default Key weak encryptionCVE-2020-5374
1580495.44.36.5
 
 
Dell EMC OpenManage Integration weak authenticationCVE-2020-5373
1580487.57.47.7
 
 
Traccar GPS Tracking System LDAP Search Filter LDAP injection privilege escalationCVE-2020-5246
1580475.44.76.1
 
 
IBM QRadar SIEM Web UI cross site scriptingCVE-2020-4513
1580465.94.77.2
 
 
IBM QRadar SIEM Command privilege escalationCVE-2020-4512
1580455.44.36.5
 
 
IBM QRadar SIEM qflow denial of serviceCVE-2020-4511
1580445.14.75.5
 
 
IBM QRadar SIEM XML Data XML External EntityCVE-2020-4510
1580434.74.15.4
 
 
IBM QRadar SIEM Web UI cross site scriptingCVE-2020-4364
1580425.55.59.8
 
 
Dubbo Deserialization privilege escalationCVE-2020-1948
1580413.53.56.1
 
 
RosarioSIS NotifyParents.php cross site scriptingCVE-2020-15721
1580405.55.58.1
 
 
Dogtag PKI pki.client.PKIConnection weak authenticationCVE-2020-15720
1580394.64.69.8
 
 
Red Hat Enterprise Linux OpenLDAP Package weak authenticationCVE-2020-15719
1580384.34.38.8
 
 
MISP cross site request forgeryCVE-2020-15711
1580375.15.54.6
 
 
Envoy weak authenticationCVE-2020-15104
1580362.82.82.8
 
 
freewvs python os.walk() Recursion denial of serviceCVE-2020-15101
1580352.82.82.8
 
 
freewvs File denial of serviceCVE-2020-15100
1580345.55.57.5
 
 
OpenVPN Access Server User Authentication Token weak authenticationCVE-2020-15074
1580273.53.57.5
 
 
Apache Tomcat WebSocket Frame Loop denial of serviceCVE-2020-13935
1580263.53.57.5
 
 
Apache Tomcat h2c Direct Connection Memory Exhaustion denial of serviceCVE-2020-13934
1580256.36.39.8
 
 
Kylin Hyve SQL sql injectionCVE-2020-13926
1580245.55.59.8
 
 
Kylin Restful API OS Command Injection privilege escalationCVE-2020-13925
1580235.55.57.5
 
 
Sylabs Singularity Integrity Check privilege escalationCVE-2020-13847
1580225.55.57.5
 
 
Sylabs Singularity Error unknown vulnerabilityCVE-2020-13846
1580215.55.57.5
 
 
Sylabs Singularity Integrity Check privilege escalationCVE-2020-13845
1580205.55.510.0
 
 
WebKitGTK/WPE WebKit Bubblewrap Sandbox privilege escalationCVE-2020-13753
1580197.06.37.87.8
 
Microsoft Windows Windows Runtime privilege escalationCVE-2020-1370
1580185.55.53.3
 
 
Rockwell Automation Logix Designer Studio 5000 XML Data XML External EntityCVE-2020-12025
1580178.57.39.8
 
 
Rittal PDU-3C002DEC/CMCIII-PU-9333E0FB privilege escalationCVE-2020-11956

Want to stay up to date on a daily basis?

Enable the mail alert feature now!