CVSSv3 08/11/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1599097.87.87.8
 
 
EVGA Precision X1 Driver WinRing0.sys privileges management0.05CVE-2020-14979
1596867.06.37.8
 
 
Adobe Acrobat Reader use after free0.03CVE-2020-9722
1596857.06.37.8
 
 
Adobe Acrobat Reader use after free0.06CVE-2020-9715
1596847.06.37.8
 
 
Adobe Acrobat Reader buffer overflow0.07CVE-2020-9704
1596837.06.37.8
 
 
Adobe Acrobat Reader buffer overflow0.00CVE-2020-9701
1596827.06.37.8
 
 
Adobe Acrobat Reader buffer overflow0.05CVE-2020-9700
1596817.06.37.8
 
 
Adobe Acrobat Reader buffer overflow0.07CVE-2020-9699
1596807.06.37.8
 
 
Adobe Acrobat Reader buffer overflow0.07CVE-2020-9698
1596795.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9721
1596785.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9720
1596775.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.04CVE-2020-9719
1596765.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9718
1596755.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9717
1596745.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9716
1596733.84.33.3
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9710
1596723.84.33.3
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9707
1596713.84.33.3
 
 
Adobe Acrobat Reader out-of-bounds read0.08CVE-2020-9706
1596705.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-9705
1596695.94.37.5
 
 
Adobe Acrobat Reader out-of-bounds read0.07CVE-2020-9723
1596684.94.35.5
 
 
Adobe Acrobat Reader resource consumption0.00CVE-2020-9703
1596674.94.35.5
 
 
Adobe Acrobat Reader resource consumption2.07CVE-2020-9702
1596665.96.35.5
 
 
Adobe Acrobat Reader authorization0.00CVE-2020-9712
1596655.96.35.5
 
 
Adobe Acrobat Reader authorization1.73CVE-2020-9696
1596647.06.37.8
 
 
Adobe Acrobat Reader out-of-bounds write1.70CVE-2020-9694
1596637.06.37.8
 
 
Adobe Acrobat Reader out-of-bounds write0.07CVE-2020-9693
1596627.06.37.8
 
 
Adobe Acrobat Reader privileges management0.00CVE-2020-9714
1596614.94.35.5
 
 
Adobe Acrobat Reader information disclosure0.09CVE-2020-9697
1596606.25.37.1
 
 
PACTware Password insufficiently protected credentials0.08CVE-2020-9404
1596594.43.35.5
 
 
PACTware Password insufficiently protected credentials0.05CVE-2020-9403
1596585.54.36.8
 
 
Huawei HonorV20 Encrypted File improper authentication0.08CVE-2020-9244
1596574.22.26.3
 
 
Google go-tpm TPM1.2 Library initialization0.03CVE-2020-8918
1596562.52.52.5
 
 
AWS S3 Crypto SDK for GoLang AES-GCM Key risky encryption0.06CVE-2020-8912
1596554.22.85.6
 
 
AWS S3 Crypto SDK for GoLang AES-CBC risky encryption0.05CVE-2020-8911
1596545.85.36.4
 
 
Avaya Aura Communication Manager/Aura Messaging System Management Interface cross-site request forgery0.07CVE-2020-7029
1596536.45.37.5
 
 
django-celery-results cleartext storage0.00CVE-2020-17495
1596525.95.36.5
 
 
GNOME gnome-shell Password Box insufficiently protected credentials0.04CVE-2020-17489
1596517.47.37.5
 
 
radare2 Signature x509.c null termination0.00CVE-2020-17487
1596508.57.39.8
 
 
Turcom TRCwifiZone Redirect control.php improper authentication0.14CVE-2020-17466
1596496.55.37.8
 
 
Telegram Desktop Protection Mechanism authorization0.00CVE-2020-17448
1596488.57.39.8
 
 
Firejail os command injection0.12CVE-2020-17368
1596476.55.37.8
 
 
Firejail os command injection0.06CVE-2020-17367
1596468.57.39.8
 
 
Temi Application hard-coded credentials0.00CVE-2020-16170
1596456.45.37.5
 
 
QEMU net_tx_pkt.c net_tx_pkt_add_raw_fragment input validation0.06CVE-2020-16092
1596444.43.55.4
 
 
Soplanning Persistent cross site scripting0.25CVE-2020-15597
1596435.24.36.1
 
 
Symphony CMS content.blueprintsevents.php appendSubheading cross site scripting0.03CVE-2020-15071
1596424.43.35.5
 
 
Teradici PCoIP Standard Agent/Graphics Agent Broker Protocol Message information disclosure0.05CVE-2020-13179
1596415.44.26.7
 
 
Teradici PCoIP Standard Agent/Graphics Agent Signature Validation insufficient verification of data authenticity0.07CVE-2020-13178
1596406.55.37.8
 
 
Teradici PCoIP Standard Agent/Graphics Agent Support Bundler uncontrolled search path0.05CVE-2020-13177
1596395.75.36.1
 
 
Teradici Cloud Access Connector Management Interface Stored cross site scripting0.00CVE-2020-13176
1596386.45.37.5
 
 
Teradici Cloud Access Connector Management Interface Credentials information disclosure0.00CVE-2020-13175

Interested in the pricing of exploits?

See the underground prices here!