CVSSv3 10/06/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1623075.53.57.5
 
 
WildFly OpenSSL HTTP Session memory leak0.07CVE-2020-25644
1623066.35.57.2
 
 
Linux Kernel HDLC_PPP Module memory corruption0.00CVE-2020-25643
1623055.55.55.5
 
 
Linux Kernel biovecs infinite loop0.00CVE-2020-25641
1623045.13.56.7
 
 
QEMU libvirt API access control0.06CVE-2020-25637
1623034.83.56.1
 
 
IBM Security Access Manager Appliance Web UI cross site scriting0.05CVE-2019-4725
1623025.53.57.5
 
 
MonoCMS Blog log.xml inadequate encryption0.07CVE-2020-25987
1623015.03.56.5
 
 
MonoCMS Blog cross-site request forgery0.00CVE-2020-25986
1623006.55.57.5
 
 
Ruby WEBrick request smuggling0.07CVE-2020-25613
1622995.24.36.1
 
 
projectworlds Car Rental Management System Admin Login message_admin.php cross site scripting0.08CVE-2020-23832
1622987.65.59.8
 
 
GNU C Library search.texi return value0.00CVE-1999-0199
1622978.48.08.8
 
 
Elecom WRC-1167GST2 os command injection0.00CVE-2020-5634
1622966.65.57.8
 
 
InfoCage SiteShell Access Restriction unknown vulnerability0.06CVE-2020-5632
1622954.83.56.1
 
 
CMONOS.JP cross site scriting0.00CVE-2020-5631
1622945.55.55.5
 
 
OpenSC TCOS Smart Card Software Driver tcos_decipher buffer overflow0.04CVE-2020-26572
1622935.55.55.5
 
 
OpenSC gemsafe GPK Smart Card Software Driver sc_pkcs15emu_gemsafeGPK_init stack-based overflow0.04CVE-2020-26571
1622925.55.55.5
 
 
OpenSC Oberthur Smart Card Software Driver sc_oberthur_read_file buffer overflow0.04CVE-2020-26570
1622857.65.59.8
 
 
ZTE ZXONE 19700 SNPE Access Control access control0.04CVE-2020-6875
1622835.53.57.5
 
 
ClickStudios Passwordstate Password Reset Portal ResetPassword improper authentication0.06CVE-2020-26061
1622827.15.58.8
 
 
CuppaCMS unrestricted upload0.05CVE-2020-26048

Want to stay up to date on a daily basis?

Enable the mail alert feature now!