CVSSv3 11/06/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1644605.94.37.5
 
 
NetApp SANtricity OS Controller Software denial of service0.05CVE-2020-8580
1644597.56.38.8
 
 
HPE OneView/Synergy Composer access control0.00CVE-2020-7198
1644585.14.16.2
 
 
TP-LINK Archer A7 USB Driver symlink0.00CVE-2020-5795
1644574.34.34.3
 
 
IBM UrbanCode Deploy information disclosure0.00CVE-2020-4484
1644564.34.34.3
 
 
IBM UrbanCode Deploy information exposure0.00CVE-2020-4483
1644556.46.36.5
 
 
IBM UrbanCode Deploy REST Call access control0.00CVE-2020-4482
1644546.96.37.5
 
 
Synopsys hub-rest-api-python SSL Certificate certificate validation0.07CVE-2020-27589
1644535.53.57.5
 
 
Play Framework PlayJava denial of service0.00CVE-2020-27196
1644525.53.57.5
 
 
Play Framework JSON Document recursion0.06CVE-2020-26883
1644515.53.57.5
 
 
Play Framework JSON form-data resource consumption0.05CVE-2020-26882
1644508.57.39.8
 
 
Cellinx NVT Web Server SetFileContent.cgi improper authentication0.08CVE-2020-28250
1644494.83.56.1
 
 
Joplin Note cross site scripting0.07CVE-2020-28249
1644485.95.36.5
 
 
Asterisk PBX INVITE infinite loop0.05CVE-2020-28242
1644475.53.57.5
 
 
MIT Kerberos 5 ASN.1 asn1_encode.c recursion0.09CVE-2020-28196
1644467.65.59.8
 
 
NATS nats-server access control0.00CVE-2020-26892
1644455.53.57.5
 
 
NATS nats-server JWT Library null pointer dereference0.02CVE-2020-26521
1644448.06.39.8
 
 
SaltStack Salt salt-netapi improper authentication0.00CVE-2020-25592
1644435.25.05.5
 
 
SaltStack Salt TLS Module certificate validation0.04CVE-2020-17490
1644427.65.59.8
 
 
SaltStack Salt Salt API os command injection0.05CVE-2020-16846
1644416.24.38.2
 
 
Kuka SVisual Components License Manager Service denial of service0.04CVE-2020-10292
1644405.94.37.5
 
 
Kuka Visual Components License Manager Service information disclosure0.00CVE-2020-10291
1644395.96.35.5
 
 
Studyplus App API Key hard-coded credentials0.06CVE-2020-5667
1644386.45.37.5
 
 
Mitsubishi Electric GT1455-QTBDE TCPIP resource consumption0.00CVE-2020-5649
1644378.06.39.8
 
 
Mitsubishi Electric GT1455-QTBDE TCPIP argument injection0.05CVE-2020-5648
1644368.57.39.8
 
 
Mitsubishi Electric GT1455-QTBDE TCPIP access control0.00CVE-2020-5647
1644356.45.37.5
 
 
Mitsubishi Electric GT1455-QTBDE TCPIP null pointer dereference0.05CVE-2020-5646
1644346.45.37.5
 
 
Mitsubishi Electric GT1455-QTBDE TCPIP session fixiation0.03CVE-2020-5645
1644338.57.39.8
 
 
Mitsubishi Electric GT1455-QTBDE TCPIP buffer overflow0.07CVE-2020-5644
1644326.46.36.5
 
 
Cybozu Garoon Bulletin Board input validation0.07CVE-2020-5643
1644316.05.56.5
 
 
libmaxminddb maxminddb.c dump_entry_data_list heap-based overflow0.09CVE-2020-28241
1644306.55.37.8
 
 
tmux input.c input_csi_dispatch_sgr_colon stack-based overflow0.05CVE-2020-27347
1644296.55.37.8
 
 
libvirt Socket permission assignment0.06CVE-2020-15708
1643675.86.35.3
 
 
UniFi Protect controller API improper authentication0.00CVE-2020-8267
1643667.27.66.8
 
 
HPE Proliant Gen10 Server Intel Innovation Engine access control0.04CVE-2020-7207
1643656.54.38.8
 
 
ZTE ZXA10 eODN information disclosure0.04CVE-2020-6877
1643645.04.65.5
 
 
Check Point Endpoint Security Log File link following0.05CVE-2020-6015
1643635.53.57.5
 
 
F5 BIG-IP Advanced WAF/BIG-IP FPS Traffic Management Microkernel denial of service0.00CVE-2020-5946
1643626.54.78.4
 
 
F5 BIG-IP TMUI Page cross site scripting0.04CVE-2020-5945
1643613.93.54.3
 
 
F5 BIG-IQ DNS Overview Page information exposure0.08CVE-2020-5944
1643606.46.36.5
 
 
F5 BIG-IP REST Interface access control0.04CVE-2020-5943

Do you want to use VulDB in your project?

Use the official API to access entries easily!