CVSSv3 08/12/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1599797.16.38.0
 
 
Microsoft Dynamics 365 for Finance/Operations input validation0.06CVE-2020-1182
1598316.46.36.5
 
 
Asylo enc_untrusted_recvfrom buffer overflow0.00CVE-2020-8905
1598306.36.36.4
 
 
Asylo ecall_restore Local Privilege Escalation0.08CVE-2020-8904
1597915.86.35.3
 
 
Documalis Free PDF Editor/Free PDF Scanner PDF File buffer overflow0.07CVE-2020-7374
1597843.83.54.1
 
 
McAfee Data Loss Prevention ePO Extension cross site scripting0.00CVE-2020-7301
1597835.56.34.6
 
 
McAfee Data Loss Prevention ePO Extension improper authorization0.00CVE-2020-7300
1597818.57.39.8
 
 
Qt qxbmhandler.cpp read_xbm_body buffer overflow0.00CVE-2020-17507
1597805.24.36.1
 
 
php-fusion Preview Page cross site scripting0.05CVE-2020-17450
1597794.43.55.4
 
 
php-fusion Log File cross site scripting0.00CVE-2020-17449
1597785.24.36.1
 
 
Nova Lite Theme search.php Reflected cross site scripting0.00CVE-2020-17362
1597775.45.35.5
 
 
ReadyTalk Avian classpath-common.h arrayCopy memory corruption0.00CVE-2020-17361
1597766.55.37.8
 
 
ReadyTalk Avian classpath-common.h arrayCopy integer overflow0.00CVE-2020-17360
1597515.24.36.1
 
 
Firco Continuity Login Page Stored cross site scripting0.00CVE-2020-16186
1597506.45.37.5
 
 
Cisco Unified IP Conference Station 7937G input validation0.08CVE-2020-16139
1597497.57.57.5
 
 
Cisco Unified IP Conference Station 7937G input validation0.00CVE-2020-16138
1597488.57.39.8
 
 
Cisco Unified IP Conference Station 7937G SSH Administrative Console privileges management0.00CVE-2020-16137
1597477.47.37.5
 
 
Sonatype Nexus Repository Manager Access Control authorization0.00CVE-2020-15868
1597464.52.36.7
 
 
ALPS Alpine TouchPad Driver DLL information disclosure0.00CVE-2020-15596
1597418.57.39.8
 
 
VPNCrypt M10 WiFi Module os command injection0.04CVE-2020-12107
1597408.57.39.8
 
 
VPNCrypt M10 WiFi Module input validation0.07CVE-2020-12106
1597307.56.38.8
 
 
Google Android Play Core permissions0.00CVE-2020-8913
1597298.57.39.8
 
 
BlackBerry QNX Software Development Platform Slinger Web Server input validation0.07CVE-2020-6932
1597283.53.33.8
 
 
Eaton Secure Connect Mobile App Logcat File Credentials log file0.00CVE-2020-6653
1597274.34.34.3
 
 
SAP NetWeaver/ABAP Platform SOA Configuration Trace information disclosure0.00CVE-2020-6310
1597267.57.57.5
 
 
SAP NetWeaver AS JAVA Web Service denial of service0.00CVE-2020-6309
1597255.96.35.4
 
 
SAP ERP HCM Travel Management privileges management0.00CVE-2020-6301
1597244.13.44.8
 
 
SAP Business Intelligence Platform Central Management Console Stored cross site scriting0.09CVE-2020-6300
1597234.34.34.3
 
 
SAP NetWeaver/ABAP Platform ABAP Server information disclosure0.06CVE-2020-6299
1597227.36.38.3
 
 
SAP Banking Services Generic Market Data privileges management0.06CVE-2020-6298
1597214.32.36.3
 
 
SAP Data Intelligence information disclosure0.00CVE-2020-6297
1597207.36.38.3
 
 
SAP NetWeaver/ABAP Platform ABAP Server code injection0.00CVE-2020-6296
1597194.72.57.0
 
 
SAP Adaptive Server Enterprise Installation Log File information disclosure0.00CVE-2020-6295
1597184.55.53.5
 
 
SAP Business Intelligence Platform Xvfb privileges management0.07CVE-2020-6294
1597177.37.37.3
 
 
SAP NetWeaver Knowledge Management privileges management0.09CVE-2020-6293
1597166.54.19.0
 
 
SAP NetWeaver Knowledge Management Stored cross site scriting0.00CVE-2020-6284
1597154.95.44.3
 
 
SAP S4 HANA Attachment Service denial of service0.09CVE-2020-6273
1597149.18.310.0
 
 
Concourse GitLab Auth Connector authentication spoofing0.07CVE-2020-5415
1597134.34.34.3
 
 
Flaky Test Handler Plugin cross-site request forgery0.03CVE-2020-2237
1597124.43.55.4
 
 
Visualizer Plugin Tooltip Stored cross site scripting1.18CVE-2020-2236
1597115.44.36.5
 
 
Pipeline Maven Integration Plugin cross-site request forgery0.03CVE-2020-2235
1597105.75.06.5
 
 
Pipeline Maven Integration Plugin Permission Check improper authorization1.51CVE-2020-2234
1597095.44.36.5
 
 
Pipeline Maven Integration Plugin Permission Check Credentials improper authorization0.09CVE-2020-2233
1597086.45.37.5
 
 
Email Extension Plugin Configuration Password cleartext transmission0.00CVE-2020-2232
1597074.43.55.4
 
 
Jenkins Build Stored cross site scripting0.00CVE-2020-2231
1597064.43.55.4
 
 
Jenkins Project Naming Strategy Description Stored cross site scripting0.06CVE-2020-2230
1597054.43.55.4
 
 
Jenkins Tooltip Stored cross site scripting0.16CVE-2020-2229
1597043.64.13.0
 
 
Palo Alto PAN-OS Policy Enforcement input validation0.09CVE-2020-2035
1597038.57.39.8
 
 
Artica Web Proxy Privileges fw.login.php sql injection0.13CVE-2020-17506
1597027.56.38.8
 
 
Artica Web Proxy cyrus.php os command injection0.08CVE-2020-17505
1597017.26.38.1
 
 
iNet wireless daemon EAPOL Message eapol.c privileges management0.05CVE-2020-17497

Do you want to use VulDB in your project?

Use the official API to access entries easily!