CVSSv3 08/13/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1599226.25.07.4
 
 
SmartControl uncontrolled search path0.08CVE-2020-7360
1599215.45.35.5
 
 
njs njs_value.c njs_value_property input validation0.09CVE-2020-24349
1599205.45.35.5
 
 
njs njs_json.c njs_json_stringify_iterator out-of-bounds read0.09CVE-2020-24348
1599195.45.35.5
 
 
njs njs_lvlhsh.c njs_lvlhsh_level_find out-of-bounds read0.07CVE-2020-24347
1599186.55.37.8
 
 
njs njs_json.c njs_json_parse_iterator_call use after free0.00CVE-2020-24346
1599175.53.37.8
 
 
JerryScript out-of-bounds write0.05CVE-2020-24345
1599166.25.37.1
 
 
JerryScript out-of-bounds read0.05CVE-2020-24344
1599156.55.37.8
 
 
Artifex MuJS jsrun.c use after free0.08CVE-2020-24343
1599147.87.87.8
 
 
Lua Protection Mechanism luaO_pushvfstring memory corruption0.07CVE-2020-24342
1599136.77.85.5
 
 
TrouSerS tcsd link following0.06CVE-2020-24332
1599127.47.07.8
 
 
TrouSerS tcsd tcsd.conf permission assignment0.05CVE-2020-24331
1599117.47.07.8
 
 
TrouSerS tcsd permission assignment0.04CVE-2020-24330
1599105.44.36.5
 
 
Wireshark Kafka Protocol Dissector packet-kafka.c double free0.06CVE-2020-17498
1599086.55.37.8
 
 
Google Android seccomp privileges management0.06CVE-2020-0261
1599076.55.37.8
 
 
ABBYY FineReader License Server link following0.00CVE-2019-20383
1599069.89.89.8
 
 
IBM WebSphere Application Server injection0.00CVE-2020-4589
1599058.57.39.8
 
 
Fuel CMS items sql injection0.07CVE-2020-17463
1599047.97.38.6
 
 
VNG Zalo Desktop Zalo.exe injection0.05CVE-2020-16087
1599037.56.38.8
 
 
Loway QueueMetrics qm_export_stats_run.do sql injection0.07CVE-2020-15947
1599027.56.38.8
 
 
Loway QueueMetrics sql injection0.08CVE-2020-15925
1599014.34.34.3
 
 
Niagara/Niagara Enterprise Security TLS Handshake denial of service0.00CVE-2020-14483
1599006.97.46.4
 
 
GitLab Configuration server-side request forgery0.00CVE-2020-13286
1598995.43.57.3
 
 
GitLab Tooltip cross site scriting0.07CVE-2020-13285
1598987.37.37.3
 
 
GitLab Milestone Title cross site scriting0.07CVE-2020-13283
1598973.53.93.1
 
 
GitLab Group Transfer privileges management0.00CVE-2020-13282
1598965.44.36.5
 
 
GitLab Project Import denial of service0.07CVE-2020-13281
1598955.44.36.5
 
 
GitLab Logging memory allocation0.08CVE-2020-13280
1598947.37.86.7
 
 
Spirent Avalanche Admin Interface injection0.00CVE-2020-11733
1598934.34.34.3
 
 
IBM Maximo Asset Management path traversal0.00CVE-2019-4582
1598928.57.39.8
 
 
PEGA Platform Access Control LDAP injection privileges management0.03CVE-2019-16374
1598296.55.37.8
 
 
Intel RealSense D400 Installer default permission0.06CVE-2020-8763
1598286.05.36.7
 
 
Intel SSD DCT Access Control privileges management0.05CVE-2020-8759
1598276.55.37.8
 
 
Intel Mailbox Interface Driver Installer default permission0.00CVE-2020-8743
1598266.05.36.7
 
 
Intel NUC Firmware Validation input validation0.00CVE-2020-8742
1598256.55.37.8
 
 
Intel Computing Improvement Program Access Control privileges management0.07CVE-2020-8736
1598246.05.36.7
 
 
Intel Server Board M10JNP2SB memory corruption0.00CVE-2020-8733
1598237.56.38.8
 
 
Intel Server Board/Server System/Compute Module out-of-bounds write0.09CVE-2020-8732
1598227.05.38.8
 
 
Intel Server Board/Server System/Compute Module File System permission assignment0.09CVE-2020-8731
1598217.05.38.8
 
 
Intel Server Board/Server System/Compute Module out-of-bounds write0.08CVE-2020-8730
1598206.55.37.8
 
 
Intel Server Board/Server System/Compute Module buffer overflow0.09CVE-2020-8729
1598194.93.56.3
 
 
Intel Server Board/Server System/Compute Module cross site scripting0.08CVE-2020-8723
1598186.75.38.2
 
 
Intel Server Board/Server System/Compute Module Subsystem buffer overflow0.00CVE-2020-8722
1598176.75.38.2
 
 
Intel Server Board/Server System/Compute Module input validation0.00CVE-2020-8721
1598165.45.35.5
 
 
Intel Server Board/Server System/Compute Module Subsystem buffer overflow0.00CVE-2020-8720
1598156.75.38.2
 
 
Intel Server Board/Server System/Compute Module Subsystem buffer overflow0.00CVE-2020-8719
1598147.05.38.8
 
 
Intel Server Board/Server System/Compute Module Subsystem buffer overflow0.00CVE-2020-8718
1598134.43.35.5
 
 
Intel Server Board/Server System/Compute Module Subsystem input validation0.00CVE-2020-8717
1598124.43.35.5
 
 
Intel Server Board/Server System/Compute Module Access Control denial of service0.00CVE-2020-8716
1598114.43.35.5
 
 
Intel Server Board/Server System/Compute Module release of reference2.12CVE-2020-8715
1598106.85.97.8
 
 
Intel Server Board/Server System/Compute Module improper authentication2.29CVE-2020-8714

Do you know our Splunk app?

Download it now for free!