CVSSv3 10/12/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1625415.55.5
 
 
 
Huawei Taurus-AN00B Module buffer overflow0.05CVE-2020-9240
1625405.55.5
 
 
 
Huawei Taurus-AN00B Module buffer overflow0.05CVE-2020-9238
1625393.53.5
 
 
 
Huawei WS5800-10 Message denial of service0.05CVE-2020-9230
1625385.55.5
 
 
 
Huawei P30 Pro buffer overflow0.04CVE-2020-9123
1625375.55.5
 
 
 
Huawei WS7200-10 input validation0.05CVE-2020-9122
1625363.53.5
 
 
 
Huawei Taurus-AN00B information disclosure0.05CVE-2020-9110
1625353.53.5
 
 
 
Huawei Mate 20 information disclosure0.04CVE-2020-9109
1625344.34.3
 
 
 
Huawei P30 Pro Message out-of-bounds write0.05CVE-2020-9108
1625334.34.3
 
 
 
Huawei P30 Pro Message out-of-bounds read0.05CVE-2020-9107
1625323.53.5
 
 
 
Huawei P30 Pro path traversal0.05CVE-2020-9106
1625315.55.5
 
 
 
Huawei Taurus-AN00B out-of-bounds write0.05CVE-2020-9091
1625305.55.5
 
 
 
Huawei FusionAccess improper authorization0.05CVE-2020-9090
1625293.33.3
 
 
 
Huawei Taurus-AL00A XFRM Module out-of-bounds read0.00CVE-2020-9087
1625285.55.5
 
 
 
Samsung Update Inter-Process Communication deserialization0.00CVE-2020-7811
1625274.34.3
 
 
 
IBM Curam Social Program Management readLine denial of service0.00CVE-2020-4781
1625263.13.1
 
 
 
IBM Curam Social Program Management OOTB Build Script information disclosure0.00CVE-2020-4780
1625253.73.7
 
 
 
IBM Curam Social Program Management risky encryption0.09CVE-2020-4778
1625245.35.3
 
 
 
IBM Curam Social Program Management path traversal0.00CVE-2020-4776
1625233.53.5
 
 
 
IBM Curam Social Program Management cross site scripting0.00CVE-2020-4775
1625224.34.3
 
 
 
IBM Curam Social Program Management information disclosure0.05CVE-2020-4774
1625214.34.3
 
 
 
IBM Curam Social Program Management cross-site request forgery0.05CVE-2020-4773
1625206.36.3
 
 
 
IBM Curam Social Program Management xml external entity reference0.06CVE-2020-4772
1625193.53.5
 
 
 
IBM InfoSphere Information Server Web UI cross site scriting0.05CVE-2020-4741
1625184.34.3
 
 
 
IBM InfoSphere Information Server cross site scriting0.00CVE-2020-4740
1625174.34.3
 
 
 
IBM Security Access Manager/Security Verify Access information exposure0.06CVE-2020-4699
1625164.34.3
 
 
 
IBM Security Guardium File Content injection0.08CVE-2020-4689
1625154.14.1
 
 
 
IBM Security Guardium Web UI cross site scripting0.04CVE-2020-4681
1625144.14.1
 
 
 
IBM Security Guardium Web UI cross site scripting0.05CVE-2020-4680
1625133.43.4
 
 
 
IBM Security Guardium Web UI cross site scriting0.05CVE-2020-4679
1625124.34.3
 
 
 
IBM Security Guardium Admin Access information disclosure0.06CVE-2020-4678
1625114.34.3
 
 
 
IBM Security Access Manager/Security Verify Access information exposure0.05CVE-2020-4661
1625104.34.3
 
 
 
IBM Security Access Manager/Security Verify Access Access Manager information exposure0.06CVE-2020-4660
1625094.34.3
 
 
 
IBM Cognos Analytics Servlet information exposure0.06CVE-2020-4388
1625086.36.3
 
 
 
IBM Cognos Analytics Excel File injection0.05CVE-2020-4302
1625073.53.5
 
 
 
ARC Informatique PcVue information disclosure0.05CVE-2020-26869
1625065.35.3
 
 
 
ARC Informatique PcVue Web Client denial of service0.05CVE-2020-26868
1625056.36.3
 
 
 
ARC Informatique PcVue Interface deserialization0.06CVE-2020-26867
1625044.34.3
 
 
 
Apache Tomcat HTTP2 Client information disclosure0.05CVE-2020-13943
1625035.55.5
 
 
 
GitLab Permission Check permission0.05CVE-2020-13341
1625025.35.3
 
 
 
SonicWALL SonicOS Login Page information exposure0.00CVE-2020-5143
1625014.34.3
 
 
 
SonicWALL SonicOS SSL VPN Web Interface cross site scripting0.05CVE-2020-5142
1625003.73.7
 
 
 
SonicWALL SonicOS Virtual Assist Ticket ID protection mechanism failure0.05CVE-2020-5141
1624995.35.3
 
 
 
SonicWALL SonicOS SSL VPN Service out-of-bounds read0.00CVE-2020-5140
1624985.35.3
 
 
 
SonicWALL SonicOS release of reference0.00CVE-2020-5139
1624975.35.3
 
 
 
SonicWALL SonicOS SSL VPN Service heap-based buffer overflow0.00CVE-2020-5138
1624967.37.3
 
 
 
SonicWALL SonicOS SSL VPN Service buffer overflow0.00CVE-2020-5137
1624953.53.5
 
 
 
SonicWALL SonicOS SSL-VPN Portal buffer overflow0.05CVE-2020-5136
1624944.34.3
 
 
 
SonicWALL SonicOS buffer overflow0.05CVE-2020-5135
1624933.53.5
 
 
 
SonicWALL SonicOS out-of-bounds read0.00CVE-2020-5134
1624925.35.3
 
 
 
SonicWALL SonicOS buffer overflow0.05CVE-2020-5133

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!