CVSSv3 09/23/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1618134.74.74.7
 
 
Xen Timer Migration race condition0.06CVE-2020-25604
1618125.35.3
 
 
 
Xen Event Channel smp_*mb memory corruption0.06CVE-2020-25603
1618115.55.5
 
 
 
Xen Error denial of service0.07CVE-2020-25602
1618103.33.3
 
 
 
Xen FIFO Event Channel evtchn_destroy denial of service0.06CVE-2020-25601
1618095.55.5
 
 
 
Xen Event Channel denial of service0.07CVE-2020-25600
1618085.35.3
 
 
 
Xen evtchn_reset memory corruption0.07CVE-2020-25599
1618075.55.5
 
 
 
Xen RCU denial of service0.08CVE-2020-25598
1618065.55.5
 
 
 
Xen denial of service0.00CVE-2020-25597
1618055.55.5
 
 
 
Xen SYSENTER null termination0.00CVE-2020-25596
1618047.07.0
 
 
 
Xen PCI Passthrough backdoor0.05CVE-2020-25595
1618034.84.35.4
 
 
IgniteNet HeliOS GLinq cross-site request forgery0.05CVE-2020-5783
1618023.33.3
 
 
 
IgniteNet HeliOS GLinq denial of service0.07CVE-2020-5782
1618013.33.3
 
 
 
IgniteNet HeliOS GLinq Luci Configuration luci authenticator.htmlauth denial of service0.06CVE-2020-5781
1618003.13.13.1
 
 
IBM Security Secret Server SSL Certificate Validator improper authentication0.00CVE-2020-4340
1617994.96.33.5
 
 
IBM Security Secret Server privileges management0.07CVE-2020-4324
1617985.24.36.1
 
 
gon Gem XSS Protection Mechanism json_dumper.rb cross site scripting0.07CVE-2020-25739
1617975.35.3
 
 
 
YGOPro ygocore integer overflow0.00CVE-2020-24213
1617965.35.3
 
 
 
Liquibase Runner Plugin Permission Check authorization0.05CVE-2020-2285
1617955.35.3
 
 
 
Liquibase Runner Plugin XML Parser xml external entity reference0.06CVE-2020-2284
1617944.43.55.4
 
 
Liquibase Runner Plugin Changeset Content Stored cross site scripting0.08CVE-2020-2283
1617935.36.34.3
 
 
Implied Labels Plugin Permission Check authorization0.07CVE-2020-2282
1617924.84.35.4
 
 
Lockable Resources Plugin cross-site request forgery0.05CVE-2020-2281
1617914.34.3
 
 
 
Warnings Plugin cross-site request forgery0.00CVE-2020-2280
1617908.67.49.9
 
 
Script Security Plugin Sandbox protection mechanism0.08CVE-2020-2279
1617892.52.5
 
 
 
GE Digital APM Classic Hash hash without salt0.06CVE-2020-16244
1617883.33.3
 
 
 
GE Digital APM Classic JSON authorization0.07CVE-2020-16240
1617875.32.87.8
 
 
GLPI risky encryption0.07CVE-2020-11031
1617863.33.3
 
 
 
Aruba CX Switch Cisco Discovery Protocol denial of service0.02CVE-2020-7122
1617853.33.3
 
 
 
Aruba CX Switch Link Layer Discovery Protocol denial of service0.07CVE-2020-7121
1617845.95.9
 
 
 
HPE Pay Per Use Utility Computing Service Meter doPost code injection0.06CVE-2020-24626
1617834.04.0
 
 
 
HPE Pay Per Use Utility Computing Service Meter doGet path traversal0.06CVE-2020-24625
1617825.95.9
 
 
 
HPE Pay Per Use Utility Computing Service Meter execute path traversal0.06CVE-2020-24624
1617813.33.3
 
 
 
podman Varlink API/REST API information disclosure0.06CVE-2020-14370
1617805.35.3
 
 
 
ansible-engine dnf Module signature verification0.00CVE-2020-14365
1617795.35.3
 
 
 
Wildfly Elytron Form Authentication session fixiation0.06CVE-2020-10714
1617786.36.3
 
 
 
Undertow HTTP input validation0.04CVE-2020-10687
1617776.55.37.8
 
 
PingID integration CefSharp.BrowserSubprocess.exe privileges management0.07CVE-2020-25826
1617766.95.38.6
 
 
Cisco IOS XR DVMRP resource consumption0.06CVE-2020-3569
1617757.56.38.8
 
 
Cisco TelePresence Collaboration Endpoint Video Endpoint API path traversal0.07CVE-2020-3143
1617735.95.36.5
 
 
Cisco Unified Communications Manager Web-based Management Interface cross-site request forgery0.09CVE-2020-3135
1617726.67.35.8
 
 
Cisco Email Security Appliance Content Filter input validation0.05CVE-2020-3133
1617715.45.05.9
 
 
Cisco Unity Connection Web Management Interface path traversal0.03CVE-2020-3130
1617705.95.36.5
 
 
Cisco Hosted Collaboration Mediation Fulfillment Web-based Interface cross-site request forgery0.00CVE-2020-3124
1617696.07.34.7
 
 
Cisco Web Security Appliance API Framework Header Injection response splitting0.06CVE-2020-3117
1617684.94.35.5
 
 
Cisco WebEx UCF File input validation0.08CVE-2020-3116
1617676.45.37.5
 
 
peg-markdown markdown_lib.c process_raw_blocks null pointer dereference0.00CVE-2020-25821
1617666.45.37.5
 
 
Cisco Email Security Appliance Advanced Malware Protection input validation0.08CVE-2019-1983
1617656.95.38.6
 
 
Cisco Email Security Appliance Email Message Filter input validation0.09CVE-2019-1947
1617646.76.37.2
 
 
Cisco Unified Contact Center Express Administration Web Interface unrestricted upload0.05CVE-2019-1888
1617636.26.26.2
 
 
Cisco UCS C-Series Rack Servers Signature Validation signature verification0.09CVE-2019-1736

Do you want to use VulDB in your project?

Use the official API to access entries easily!