CVSSv3 11/03/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1642784.34.3
 
 
 
Adobe Acrobat Reader use after free0.07CVE-2020-24438
1642776.36.3
 
 
 
Adobe Acrobat Reader use after free0.00CVE-2020-24437
1642766.36.3
 
 
 
Adobe Acrobat Reader use after free0.07CVE-2020-24430
1642755.35.3
 
 
 
Adobe Acrobat Reader race condition0.03CVE-2020-24428
1642744.34.3
 
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-24434
1642734.34.3
 
 
 
Adobe Acrobat Reader out-of-bounds read0.00CVE-2020-24426
1642726.36.3
 
 
 
Adobe Acrobat Reader out-of-bounds write0.06CVE-2020-24436
1642716.36.3
 
 
 
Adobe Acrobat Reader security check for standard0.00CVE-2020-24431
1642704.34.3
 
 
 
Adobe Acrobat Reader input validation0.08CVE-2020-24427
1642697.06.37.8
 
 
Adobe Acrobat Reader signature verification0.07CVE-2020-24429
1642684.66.32.8
 
 
Adobe Acrobat Reader signature verification0.00CVE-2020-24439
1642677.06.37.8
 
 
Adobe Acrobat Reader input validation0.07CVE-2020-24432
1642666.36.3
 
 
 
Adobe Acrobat Reader access control0.00CVE-2020-24433
1642656.36.3
 
 
 
Adobe Acrobat Reader heap-based overflow0.00CVE-2020-24435
1642606.06.55.4
 
 
IBM App Connect Enterprise Certified Container improper restriction of rendered ui layers0.04CVE-2020-4785
1642594.34.34.3
 
 
IBM Planning Analytics Local TM1Web User Session user session0.04CVE-2020-4649
1642583.84.13.5
 
 
IBM Maximo Anywhere config0.00CVE-2019-4349
1642574.64.6
 
 
 
Sony KD-65AF8 USB3 Device denial of service0.00CVE-2020-28207
1642565.44.36.5
 
 
Google Chrome Networking clickjacking0.06CVE-2020-6557
1642558.16.310.0
 
 
Google Chrome UI buffer overflow0.05CVE-2020-16011
1642547.56.38.8
 
 
Google Chrome UI buffer overflow0.13CVE-2020-16010
1642537.56.38.8
 
 
Google Chrome v8 heap-based overflow0.05CVE-2020-16009
1642527.56.38.8
 
 
Google Chrome WebRTC buffer overflow0.09CVE-2020-16008
1642516.55.37.8
 
 
Google Chrome Installer access control0.07CVE-2020-16007
1642507.56.38.8
 
 
Google Chrome v8 heap-based overflow0.04CVE-2020-16006
1642497.56.38.8
 
 
Google Chrome ANGLE heap-based overflow0.09CVE-2020-16005
1642487.56.38.8
 
 
Google Chrome User Interface use after free0.00CVE-2020-16004
1642477.56.38.8
 
 
Google Chrome Renderer Process use after free0.08CVE-2020-15998
1642467.56.38.8
 
 
Google Chrome Mojo use after free0.06CVE-2020-15997
1642457.56.38.8
 
 
Google Chrome Passwords use after free0.00CVE-2020-15996
1642447.56.38.8
 
 
Google Chrome v8 out-of-bounds write0.05CVE-2020-15995
1642437.56.38.8
 
 
Google Chrome v8 use after free0.00CVE-2020-15994
1642428.06.39.8
 
 
Google Chrome Printing use after free0.04CVE-2020-15993
1642417.56.38.8
 
 
Google Chrome Same Origin Policy unknown vulnerability0.00CVE-2020-15992
1642407.56.38.8
 
 
Google Chrome Password Manager use after free0.00CVE-2020-15991
1642397.56.38.8
 
 
Google Chrome Autofill use after free0.00CVE-2020-15990
1642384.94.35.5
 
 
Google Chrome PDFium uninitialized pointer0.00CVE-2020-15989
1642376.36.36.3
 
 
Google Chrome Download access control0.04CVE-2020-15988
1642367.56.38.8
 
 
Google Chrome WebRTC Stream use after free0.03CVE-2020-15987
1642356.46.36.5
 
 
Google Chrome Media integer overflow0.00CVE-2020-15986
1642346.46.36.5
 
 
Google Chrome clickjacking0.04CVE-2020-15985
1642336.46.36.5
 
 
Google Chrome Omnibox clickjacking0.00CVE-2020-15984
1642326.34.87.8
 
 
Google Chrome webUI improper restriction of rendered ui layers0.14CVE-2020-15983
1642315.44.36.5
 
 
Google Chrome information disclosure0.13CVE-2020-15982
1642305.44.36.5
 
 
Google Chrome out-of-bounds read0.04CVE-2020-15981
1642296.55.37.8
 
 
Google Chrome Intents Local Privilege Escalation0.04CVE-2020-15980
1642287.56.38.8
 
 
Google Chrome v8 heap-based overflow0.23CVE-2020-15979
1642277.56.38.8
 
 
Google Chrome Navigation input validation0.09CVE-2020-15978
1642265.44.36.5
 
 
Google Chrome Dialog Validation information disclosure0.14CVE-2020-15977
1642257.56.38.8
 
 
Google Chrome HTML use after free0.04CVE-2020-15976

Want to stay up to date on a daily basis?

Enable the mail alert feature now!