CVSSv3 10/17/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1628265.55.55.5
 
 
Linux Kernel 64-bit Value verifier.c scalar32_min_max_or memory corruption0.05CVE-2020-27194
1628256.85.58.1
 
 
Overwolf access control0.05CVE-2020-25214
1628226.56.5
 
 
 
Juniper Junos Virtual Chassis resource consumption0.08CVE-2020-1689
1628213.83.8
 
 
 
ClearPass Junos Web API key management0.05CVE-2020-1688
1628206.56.5
 
 
 
Juniper Junos VXLAN resource consumption0.00CVE-2020-1687
1628197.57.5
 
 
 
Juniper Junos vmcore double free0.00CVE-2020-1686
1628184.74.7
 
 
 
Juniper Junos Firewall Filter information exposure0.02CVE-2020-1685
1628177.57.5
 
 
 
Juniper Junos HTTP Traffic resource consumption0.04CVE-2020-1684
1628167.57.5
 
 
 
Juniper Junos vmcore memory leak0.03CVE-2020-1683
1628155.55.5
 
 
 
Juniper Junos srxpfe denial of service0.09CVE-2020-1682
1628146.56.5
 
 
 
Juniper Junos NDP exceptional condition0.05CVE-2020-1681
1628125.35.3
 
 
 
Juniper Junos NAT64 format string0.02CVE-2020-1680
1628117.57.5
 
 
 
Juniper Junos Packet Forwarding Engine denial of service0.06CVE-2020-1679
1628106.56.5
 
 
 
Juniper Junos BGP Packet memory leak0.06CVE-2020-1678
1628097.27.2
 
 
 
Juniper Mist Cloud UI SAML Response improper authentication0.04CVE-2020-1677
1628087.27.2
 
 
 
Juniper Mist Cloud UI SAML Response improper authentication0.02CVE-2020-1676
1628078.38.3
 
 
 
Juniper Mist Cloud UI SAML improper authentication0.00CVE-2020-1675
1628065.45.4
 
 
 
Juniper Junos MACsec Packet protection mechanism0.00CVE-2020-1674
1628054.34.3
 
 
 
Juniper Junos J-Web cross site scripting0.07CVE-2020-1673
1628047.57.5
 
 
 
Juniper Junos jdhcpd denial of service0.06CVE-2020-1672
1628037.57.5
 
 
 
Juniper Junos JDHCPD out-of-bounds read0.00CVE-2020-1671
1628026.56.5
 
 
 
Juniper Junos Routing Engine resource consumption0.02CVE-2020-1670
1628014.34.3
 
 
 
Juniper Junos Device Manager Container passwd credentials storage0.05CVE-2020-1669
1628007.57.5
 
 
 
Juniper Junos Routing Engine resource consumption0.03CVE-2020-1668
1627998.38.3
 
 
 
Juniper Junos Multiservices PIC Management Daemon race condition0.00CVE-2020-1667
1627984.14.1
 
 
 
Juniper Junos System Console access control0.09CVE-2020-1666
1627975.35.3
 
 
 
Juniper Junos Packet Forwarding Engine denial of service0.05CVE-2020-1665
1627967.87.8
 
 
 
Juniper Junos Daemon stack-based overflow0.07CVE-2020-1664
1627957.57.5
 
 
 
Juniper Junos RPD denial of service0.02CVE-2020-1662
1627945.35.3
 
 
 
Juniper Junos jdhcp denial of service0.02CVE-2020-1661
1627939.18.39.9
 
 
Juniper Junos Multiservices PIC Management Daemon denial of service0.00CVE-2020-1660
1627927.57.5
 
 
 
Juniper Junos key-management-daemon denial of service0.00CVE-2020-1657
1627919.89.8
 
 
 
Juniper Junos DHCPv6 Relay-Agent Service null pointer dereference0.01CVE-2020-1656
1627905.44.36.5
 
 
EZCast Pro II Administration Panel information disclosure0.03CVE-2019-12305
1627896.96.67.2
 
 
IBM Resilient OnPrem command injection0.03CVE-2020-4636
1627885.63.77.5
 
 
IBM Security Guardium Big Data Intelligence inadequate encryption0.00CVE-2020-4254
1627875.53.57.5
 
 
Apereo CAS Secret Key improper authentication0.09CVE-2020-27178
1627866.46.36.5
 
 
Dell EMC NetWorker improper authorization0.06CVE-2020-26183
1627856.05.56.5
 
 
Dell EMC NetWorker privileges assignment0.04CVE-2020-26182
1627847.16.38.0
 
 
Wire URL shell.openExternal input validation0.02CVE-2020-15258

Might our Artificial Intelligence support you?

Check our Alexa App!