CVSSv3 11/10/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1647286.95.08.17.5
 
Microsoft Edge memory corruption0.03CVE-2020-17052
1647277.57.57.57.5
 
Microsoft Edge memory corruption0.05CVE-2020-17058
1647267.87.87.87.8
 
Microsoft Windows WalletService privileges management0.02CVE-2020-17037
1647255.55.55.55.5
 
Microsoft Windows WalletService information disclosure0.07CVE-2020-16999
1647247.87.87.87.8
 
Microsoft Windows Update Orchestrator Service privileges management0.03CVE-2020-17076
1647237.87.87.87.8
 
Microsoft Windows Update Stack privileges management0.05CVE-2020-17077
1647227.87.87.87.8
 
Microsoft Windows Update Medic Service privileges management0.00CVE-2020-17070
1647217.87.87.87.8
 
Microsoft Windows USO Core Worker privileges management0.00CVE-2020-17075
1647205.55.55.55.5
 
Microsoft Windows Delivery Optimization information disclosure0.02CVE-2020-17071
1647197.87.87.87.8
 
Microsoft Windows Update Orchestrator Service privileges management0.00CVE-2020-17073
1647187.87.87.87.8
 
Microsoft Windows Update Orchestrator Service privileges management0.00CVE-2020-17074
1647175.55.55.55.5
 
Microsoft Windows NDIS information disclosure0.00CVE-2020-17069
1647167.87.87.87.8
 
Microsoft Windows Kernel privileges management0.06CVE-2020-17087
1647157.87.87.87.8
 
Microsoft Windows Kernel privileges management0.06CVE-2020-17035
1647146.85.39.85.3
 
Microsoft Windows Defender for Endpoint Security information disclosure0.02CVE-2020-17090
1647135.55.55.55.5
 
Microsoft Visual Studio unknown vulnerability0.03CVE-2020-17100
1647128.18.87.87.8
 
Microsoft Visual Studio Code JSHint Extension input validation0.00CVE-2020-17104
1647118.18.87.87.8
 
Microsoft HEVC Video Extensions Remote Code Execution0.00CVE-2020-17109
1647108.18.87.87.8
 
Microsoft HEVC Video Extensions Remote Code Execution0.00CVE-2020-17108
1647095.55.55.55.5
 
Microsoft Windows Camera Codec information disclosure0.06CVE-2020-17113
1647088.18.87.87.8
 
Microsoft HEVC Video Extensions Remote Code Execution0.02CVE-2020-17110
1647078.18.87.87.8
 
Microsoft HEVC Video Extensions Remote Code Execution0.00CVE-2020-17107
1647068.88.89.87.8
 
Microsoft Raw Image Extension Remote Code Execution0.02CVE-2020-17078
1647058.57.89.87.8
 
Microsoft Raw Image Extension Local Privilege Escalation0.00CVE-2020-17079
1647046.25.57.55.5
 
Microsoft Raw Image Extension information disclosure0.03CVE-2020-17081
1647038.88.89.87.8
 
Microsoft Raw Image Extension Remote Code Execution0.00CVE-2020-17086
1647028.88.89.87.8
 
Microsoft Raw Image Extension Remote Code Execution0.06CVE-2020-17082
1647015.55.55.55.5
 
Microsoft WebP Image Extension information disclosure0.00CVE-2020-17102
1647008.88.89.87.8
 
Microsoft AV1 Video Extension Remote Code Execution0.03CVE-2020-17105
1646998.18.87.87.8
 
Microsoft HEIF Image Extension Remote Code Execution0.03CVE-2020-17101
1646988.18.87.87.8
 
Microsoft HEVC Video Extensions Remote Code Execution0.06CVE-2020-17106
1646977.87.87.87.8
 
Microsoft Windows Bind Filter Driver privileges management0.02CVE-2020-17012
1646967.87.87.87.8
 
Microsoft Windows Port Class Library privileges management0.05CVE-2020-17011
1646955.55.55.55.5
 
Microsoft Windows Win32k information disclosure0.00CVE-2020-17013
1646947.87.87.87.8
 
Microsoft Windows Client Side Rendering Print Provider privileges management0.02CVE-2020-17024
1646938.18.87.87.8
 
Microsoft Windows privileges management0.05CVE-2020-17025
1646927.67.87.17.8
 
Microsoft Windows Print Spooler privileges management0.00CVE-2020-17014
1646917.37.07.87.0
 
Microsoft Windows Error Reporting privileges management0.02CVE-2020-17007
1646907.87.87.87.8
 
Microsoft Windows Win32 privileges management0.03CVE-2020-17010
1646898.18.87.87.8
 
Microsoft Windows privileges management0.02CVE-2020-17055

Do you know our Splunk app?

Download it now for free!