CVSSv3 07/16/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1587327.77.38.2
 
 
IBM Sterling External Authentication Server xml external entity reference0.05CVE-2020-4462
1587313.73.14.3
 
 
IBM Publishing Engine Cookie encryption0.06CVE-2020-4316
1587304.22.56.0
 
 
IBM BigFix Platform Credentials insufficiently protected credentials0.06CVE-2020-4095
1587295.96.35.4
 
 
Cisco SD-WAN vManage Web-based Management Interface sql injection0.07CVE-2020-3468
1587285.66.34.9
 
 
Cisco Vision Dynamic Signage Director Web-based Management Interface sql injection0.00CVE-2020-3450
1587275.44.36.5
 
 
Cisco SD-WAN vManage Web-based Management Interface link following0.00CVE-2020-3437
1587265.34.36.4
 
 
Cisco SD-WAN vManage Web-based Management Interface cross site scripting0.00CVE-2020-3406
1587256.46.36.5
 
 
Cisco SD-WAN vManage Web UI xml external entity reference0.05CVE-2020-3405
1587246.46.36.5
 
 
Cisco SD-WAN vManage Web-based Management Interface path traversal0.00CVE-2020-3401
1587237.87.87.8
 
 
Cisco SD-WAN vManage CLI authentication0.00CVE-2020-3388
1587227.57.57.5
 
 
Cisco SD-WAN vManage input validation0.00CVE-2020-3387
1587216.04.77.4
 
 
Cisco SD-WAN vEdge Router Deep Packet Inspection state issue0.00CVE-2020-3385
1587207.56.38.8
 
 
Cisco SD-WAN vManage Web Management Interface path traversal0.00CVE-2020-3381
1587197.87.87.8
 
 
Cisco Data Center Network Manager CLI argument injection0.00CVE-2020-3380
1587185.35.35.3
 
 
Cisco SD-WAN Solution Operating System access control0.00CVE-2020-3379
1587175.36.34.3
 
 
Cisco SD-WAN vManage Web-based Management Interface sql injection0.00CVE-2020-3378
1587165.44.36.5
 
 
Cisco SD-WAN vManage Web-based Management Interface resource consumption0.00CVE-2020-3372
1587155.77.34.0
 
 
Cisco Content Security Management Appliance URL Filter input validation0.00CVE-2020-3370
1587146.95.38.6
 
 
Cisco SD-WAN vEdge Router Deep Ppacket Inspection range error0.07CVE-2020-3369
1587136.95.38.6
 
 
Cisco Small Business RV VPN Router SSL VPN input validation0.00CVE-2020-3358
1587128.57.39.8
 
 
Cisco RV340/RV340W/RV345/RV345P SSL VPN input validation0.06CVE-2020-3357
1587116.95.38.6
 
 
Cisco SD-WAN Solution resource management0.00CVE-2020-3351
1587104.54.34.8
 
 
Cisco Data Center Network Manager Web-based Management Interface cross site scripting0.00CVE-2020-3349
1587094.54.34.8
 
 
Cisco Data Center Network Manager Web-based Management Interface cross site scripting0.00CVE-2020-3348
1587084.85.34.3
 
 
Cisco Webex Meetings/WebEx Meetings Server input validation0.00CVE-2020-3345
1587077.26.38.1
 
 
Cisco RV110W/RV130/RV130W/RV215W Web-based Management Interface os command injection0.08CVE-2020-3332
1587068.57.39.8
 
 
Cisco RV110W/RV215W Web-based Management Interface memory corruption0.00CVE-2020-3331
1587058.57.39.8
 
 
Cisco RV110W/RV130/RV130W/RV215W Web-based Management Interface memory corruption0.00CVE-2020-3323
1587044.85.34.3
 
 
Cisco Meetings App API Subsystem authentication0.08CVE-2020-3197
1587038.17.88.4
 
 
Cisco SD-WAN Solution access control0.00CVE-2020-3180
1587024.83.75.9
 
 
Cisco RV110W/RV215W Web-based Management Interface authorization0.00CVE-2020-3150
1587017.56.38.8
 
 
Cisco RV110W/RV130/RV130W/RV215W Web-based Management Interface memory corruption0.00CVE-2020-3146
1587007.56.38.8
 
 
Cisco RV110W/RV130/RV130W/RV215W Web-based Management Interface memory corruption0.00CVE-2020-3145
1586998.57.39.8
 
 
Cisco RV110W/RV130/RV130W/RV215W Web-based Management Interface access control0.08CVE-2020-3144
1586988.57.39.8
 
 
Cisco Prime License Manager Web Management Interface credentials management0.08CVE-2020-3140
1586958.57.39.8
 
 
ConnectWise Automate authentication0.00CVE-2020-15027
1586948.57.39.8
 
 
MIT Lifelong Kindergarten Scratch scratch-vm sb3.js deserialization0.06CVE-2020-14000
1586936.45.37.5
 
 
Microweber controller.php information disclosure0.00CVE-2020-13405
1586926.45.37.5
 
 
Mitsubishi Electric MC Works64 deserialization0.00CVE-2020-12015
1586918.27.39.1
 
 
Mitsubishi Electric MC Works64 code injection0.00CVE-2020-12013
1586908.57.39.8
 
 
Mitsubishi Electric MC Works64 out-of-bounds write0.05CVE-2020-12011
1586897.47.37.5
 
 
Mitsubishi Electric MC Works64 deserialization0.00CVE-2020-12009
1586888.57.39.8
 
 
Mitsubishi Electric MC Works64 deserialization0.05CVE-2020-12007
1586834.74.15.4
 
 
IBM Jazz Team Server Web UI cross site scriting0.00CVE-2019-4748
1586824.74.15.4
 
 
IBM Team Concert Web UI cross site scriting0.05CVE-2019-4747
1586817.26.38.1
 
 
GNU LibreDWG bits.c bit_write_TF out-of-bounds read0.00CVE-2019-20915
1586807.55.39.8
 
 
GNU LibreDWG common_entity_handle_data.spec dwg_encode_common_entity_handle_data null pointer dereference0.08CVE-2019-20914
1586797.26.38.1
 
 
GNU LibreDWG common_entity_data.spec dwg_encode_entity out-of-bounds read0.00CVE-2019-20913
1586787.56.38.8
 
 
GNU LibreDWG bits.c bit_read_TF out-of-bounds write0.00CVE-2019-20912
1586775.44.36.5
 
 
GNU LibreDWG bits.c bit_calc_CRC infinite loop0.00CVE-2019-20911

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!