CVSSv3 09/25/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1620297.56.38.8
 
 
Observium Professional/Enterprise/Community unrestricted upload0.00CVE-2020-25149
1620285.24.36.1
 
 
Observium Professional/Enterprise/Community cross site scripting0.05CVE-2020-25148
1620278.06.39.8
 
 
Observium Professional/Enterprise/Community authenticate.inc.php sql injection0.00CVE-2020-25147
1620264.83.56.1
 
 
Observium Professional/Enterprise/Community syslog_rules cross site scriting0.04CVE-2020-25146
1620257.56.38.8
 
 
Observium Professional/Enterprise/Community unrestricted upload0.00CVE-2020-25145
1620247.56.38.8
 
 
Observium Professional/Enterprise/Community path traversal0.05CVE-2020-25144
1620237.56.38.8
 
 
Observium Professional/Enterprise/Community sql injection0.04CVE-2020-25143
1620225.44.36.5
 
 
Observium Professional/Enterprise/Community addsrv cross-site request forgery0.05CVE-2020-25142
1620215.24.36.1
 
 
Observium Professional/Enterprise/Community view cross site scripting0.07CVE-2020-25141
1620205.24.36.1
 
 
GE Reason S20 Ethernet Switch cross site scripting0.07CVE-2020-16242
1620198.28.38.1
 
 
TensorFlow out-of-bounds write0.00CVE-2020-15214
1620184.04.04.0
 
 
TensorFlow memory corruption0.06CVE-2020-15213
1620178.28.38.1
 
 
TensorFlow out-of-bounds write0.05CVE-2020-15212
1620166.17.34.8
 
 
TensorFlow out-of-bounds write0.03CVE-2020-15211
1620156.97.36.5
 
 
TensorFlow TFLite Model input validation0.08CVE-2020-15210
1620144.83.75.9
 
 
TensorFlow TFLite Model null pointer dereference0.06CVE-2020-15209
1620137.37.37.4
 
 
TensorFlow out-of-bounds write0.04CVE-2020-15208
1620128.58.38.7
 
 
TensorFlow ResolveAxis memory corruption0.07CVE-2020-15207
1620116.54.09.0
 
 
TensorFlow input validation0.00CVE-2020-15206
1620108.68.39.0
 
 
TensorFlow tf.raw_ops.StringNGrams memory corruption0.00CVE-2020-15205
1620095.35.35.3
 
 
TensorFlow ctx->session_state null pointer dereference0.07CVE-2020-15204
1620086.45.37.5
 
 
TensorFlow tf.strings.as_string input validation0.00CVE-2020-15203
1620078.68.39.0
 
 
TensorFlow Shard API Remote Code Execution0.00CVE-2020-15202
1620066.17.34.8
 
 
TensorFlow RaggedCountSparseOutput input validation0.00CVE-2020-15201
1620056.67.35.9
 
 
TensorFlow RaggedCountSparseOutput heap-based overflow0.04CVE-2020-15200
1620044.83.75.9
 
 
TensorFlow RaggedCountSparseOutput input validation0.04CVE-2020-15199
1620036.98.35.4
 
 
TensorFlow SparseCountSparseOutput memory corruption0.04CVE-2020-15198
1620024.93.56.3
 
 
TensorFlow SparseCountSparseOutput assertion0.04CVE-2020-15197
1620017.97.48.5
 
 
TensorFlow RaggedCountSparseOutput memory corruption0.04CVE-2020-15196
1620007.97.48.5
 
 
TensorFlow SparseFillEmptyRowsGrad heap-based overflow0.05CVE-2020-15195
1619995.35.35.3
 
 
TensorFlow SparseFillEmptyRowsGrad assertion0.05CVE-2020-15194
1619986.76.37.1
 
 
TensorFlow dlpack.to_dlpack uninitialized resource0.05CVE-2020-15193
1619974.34.34.3
 
 
TensorFlow dlpack.to_dlpack input validation0.04CVE-2020-15192
1619965.35.35.3
 
 
TensorFlow dlpack.to_dlpack null pointer dereference0.04CVE-2020-15191
1619955.35.35.3
 
 
TensorFlow tf.raw_ops.Switch input validation0.04CVE-2020-15190
1619946.77.36.1
 
 
IBM InfoSphere Information Server clickjacking0.14CVE-2020-4727
1619935.35.35.3
 
 
IBM Business Automation Workflow Error Message information disclosure0.04CVE-2020-4531
1619925.24.36.1
 
 
Observium Professional/Enterprise/Community contacts.inc.php cross site scripting0.05CVE-2020-25140
1619915.24.36.1
 
 
Observium Professional/Enterprise/Community syslog_rules cross site scripting0.07CVE-2020-25139
1619904.83.56.1
 
 
Observium Professional/Enterprise/Community alert_test_id cross site scriting0.06CVE-2020-25138
1619894.83.56.1
 
 
Observium Professional/Enterprise/Community alert_check cross site scriting0.04CVE-2020-25137
1619887.47.37.5
 
 
jdownloads categories.php order sql injection0.07CVE-2020-19455
1619875.34.16.6
 
 
ng-packagr command injection0.04CVE-2020-7735
1619865.74.07.5
 
 
F5 BIG-IP/BIG-IQ denial of service0.09CVE-2020-5930
1619854.22.55.9
 
 
F5 BIG-IP cleartext storage0.05CVE-2020-5929
1619847.56.38.8
 
 
Observium Professional/Enterprise/Community unrestricted upload0.04CVE-2020-25136
1619835.24.36.1
 
 
Observium Professional/Enterprise/Community cross site scripting0.00CVE-2020-25135
1619827.56.38.8
 
 
Observium Professional/Enterprise/Community inc.php path traversal0.00CVE-2020-25134
1619817.56.38.8
 
 
Observium Professional/Enterprise/Community inc.php unrestricted upload0.00CVE-2020-25133
1619808.57.39.8
 
 
Observium Professional/Enterprise/Community authenticate.inc.php sql injection0.07CVE-2020-25132

Do you want to use VulDB in your project?

Use the official API to access entries easily!