CVSSv3 09/18/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1622813.53.5
 
 
 
Ansible aws_ssm Connection Plugin information disclosure0.09CVE-2020-25635
1620307.37.3
 
 
 
Sourcecodester Seat Reservation System unrestricted upload0.05CVE-2020-25763
1616365.95.36.5
 
 
Huawei Taurus-AN00B use after free0.00CVE-2020-9084
1616357.47.37.5
 
 
Citrix XenMobile Server authentication0.05CVE-2020-8253
1616345.35.3
 
 
 
libuv realpath buffer overflow0.04CVE-2020-8252
1616336.45.37.5
 
 
Node.js resource consumption0.09CVE-2020-8251
1616325.35.3
 
 
 
Citrix ADC/Gateway/NetScaler Gateway/SD-WAN WANOP Management Interface privileges management0.10CVE-2020-8247
1616313.33.3
 
 
 
Citrix ADC/Gateway/NetScaler Gateway/SD-WAN WANOP Management Network resource consumption0.05CVE-2020-8246
1616303.53.5
 
 
 
Citrix ADC/Gateway/NetScaler Gateway/SD-WAN WANOP SSL VPN Web Portal cross site scripting0.05CVE-2020-8245
1616296.45.37.5
 
 
json-bigint resource consumption0.04CVE-2020-8237
1616286.45.37.5
 
 
Nextcloud Desktop Client cleartext0.08CVE-2020-8225
1616278.27.39.1
 
 
Node.js request smuggling0.15CVE-2020-8201
1616262.52.5
 
 
 
Citrix Storefront Server authentication0.05CVE-2020-8200
1616258.57.39.8
 
 
TypeORM Prototype unknown vulnerability0.05CVE-2020-8158
1616244.43.35.5
 
 
Puppet Enterprise CD4PE Deployment Definition Credentials insufficiently protected credentials0.00CVE-2020-7945
1616226.55.37.8
 
 
InstallBuilder for Qt Windows Installer untrusted search path0.00CVE-2020-3979
1616217.47.37.5
 
 
MISP Login Page privileges management0.04CVE-2020-25766
1616205.35.35.3
 
 
RESTEasy Client information exposure0.07CVE-2020-25633
1616195.23.37.1
 
 
Philips Collaboration Platform config0.04CVE-2020-16247
1616183.34.22.3
 
 
eWON Flexy/Cosy injection0.05CVE-2020-16230
1616175.44.36.5
 
 
Philips Collaboration Platform downgrade0.08CVE-2020-16200
1616166.36.36.3
 
 
Philips Collaboration Platform protection mechanism failure0.06CVE-2020-16198
1616154.62.46.8
 
 
SOY CMS unrestricted upload0.05CVE-2020-15189
1616148.27.19.3
 
 
Alfresco Reset Password Add-On input validation0.00CVE-2020-15181
1616133.53.53.5
 
 
Philips Collaboration Platform unknown vulnerability0.00CVE-2020-14525
1616125.36.34.3
 
 
Philips Collaboration Platform cross-site request forgery0.00CVE-2020-14506
1616114.94.25.6
 
 
Linux Kernel Screen Size out-of-bounds write0.10CVE-2020-14390
1616107.47.37.5
 
 
Ozeki NG SMS Gateway RSS to SMS Module xml external entity reference0.00CVE-2020-14029
1616094.84.74.9
 
 
Ozeki NG SMS Gateway ASP.NET SMS Module privileges management0.08CVE-2020-14021
1616087.87.87.8
 
 
Micro Focus Operation Agent privileges management0.05CVE-2020-11861
1616076.97.36.5
 
 
HPE Universal API Framework sql injection0.09CVE-2020-24623
1616068.67.310.0
 
 
SOY CMS Inquiry Form deserialization0.09CVE-2020-15188
1616056.55.37.8
 
 
Google Android NetworkStackNotifier preservation of permissions0.08CVE-2020-0405
1616044.94.35.5
 
 
Google Android netd out-of-bounds read0.05CVE-2020-0365
1616035.64.56.7
 
 
Google Android NFC out-of-bounds write0.04CVE-2020-0350
1616023.42.54.4
 
 
Google Android NFC preservation of permissions0.05CVE-2020-0349
1616013.41.94.9
 
 
Google Android NFC out-of-bounds read0.04CVE-2020-0348
1616005.64.56.7
 
 
Google Android iptables out-of-bounds write0.05CVE-2020-0347
1615995.64.56.7
 
 
Google Android NFC out-of-bounds write0.00CVE-2020-0335
1615985.64.56.7
 
 
Google Android NFC out-of-bounds write0.08CVE-2020-0334
1615974.43.35.5
 
 
Google Android Settings preservation of permissions0.00CVE-2020-0331
1615964.43.35.5
 
 
Google Android Networking preservation of permissions0.08CVE-2020-0327
1615955.64.56.7
 
 
Google Android NFC out-of-bounds write0.51CVE-2020-0326
1615943.42.54.4
 
 
Google Android NFC information disclosure0.60CVE-2020-0325
1615936.14.57.8
 
 
Google Android NFC out-of-bounds write0.08CVE-2020-0319
1615924.43.35.5
 
 
Google Android Telephony default permission0.57CVE-2020-0316
1615914.43.35.5
 
 
Google Android Zen Mode default permission0.60CVE-2020-0315
1615904.43.35.5
 
 
Google Android NotificationManagerService default permission0.51CVE-2020-0313
1615894.43.35.5
 
 
Google Android InputManagerService default permission0.05CVE-2020-0311
1615884.43.35.5
 
 
Google Android Settings default permission0.26CVE-2020-0310

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!