CVSSv3 11/12/2020info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1648584.43.35.5
 
 
Intel 50GbE IP Core Exception denial of service0.00CVE-2020-8767
1648575.44.36.5
 
 
Intel SGX DCAP denial of service0.01CVE-2020-8766
1648566.05.36.7
 
 
Intel CPU BIOS access control0.07CVE-2020-8764
1648553.32.04.6
 
 
Intel CSME algorithmic complexity0.03CVE-2020-8761
1648546.55.37.8
 
 
Intel AMT Subsystem integer overflow0.02CVE-2020-8760
1648536.05.36.7
 
 
Intel AMT Subsystem out-of-bounds read0.02CVE-2020-8757
1648526.05.36.7
 
 
Intel CSME Subsystem input validation0.05CVE-2020-8756
1648515.13.96.4
 
 
Intel CSME/SPS Subsystem race condition0.01CVE-2020-8755
1648506.45.37.5
 
 
Intel AMT/ISM Subsystem information disclosure0.00CVE-2020-8754
1648497.47.37.5
 
 
Intel AMT/ISM DHCP Subsystem out-of-bounds read0.02CVE-2020-8753
1648488.57.39.8
 
 
Intel AMT/ISM IPv6 subsystem out-of-bounds write0.06CVE-2020-8752
1648473.52.44.6
 
 
Intel CSME/TXE Control Flow Management information disclosure0.05CVE-2020-8751
1648466.55.37.8
 
 
Intel TXE Kernel Mode Driver use after free0.04CVE-2020-8750
1648457.56.38.8
 
 
Intel AMT Subsystem out-of-bounds read0.04CVE-2020-8749
1648448.27.39.1
 
 
Intel AMT Subsystem out-of-bounds read0.05CVE-2020-8747
1648435.44.36.5
 
 
Intel AMT Subsystem integer overflow0.02CVE-2020-8746
1648425.54.36.8
 
 
Intel CSME/TXE Control Flow Management control flow0.04CVE-2020-8745
1648416.55.37.8
 
 
Intel CSME/TXE/SPS Initialization access control0.06CVE-2020-8744
1648406.05.36.7
 
 
Intel CPU BIOS Platform Sample Code out-of-bounds write0.06CVE-2020-8740
1648396.55.37.8
 
 
Intel CPU BIOS Platform Sample Code access control0.00CVE-2020-8739
1648386.05.36.7
 
 
Intel CPU BIOS Platform Sample Code access control0.06CVE-2020-8738
1648375.54.36.8
 
 
Intel Stratix 10 FPGA memory corruption0.00CVE-2020-8737
1648365.54.36.8
 
 
Intel CSME/TXE/SPS/SoC Boot Guard insecure default initialization of resource0.05CVE-2020-8705
1648354.43.35.5
 
 
Intel CPU Isolation information disclosure0.02CVE-2020-8698
1648344.43.35.5
 
 
Intel CPU information disclosure0.02CVE-2020-8696
1648334.43.35.5
 
 
Intel CPU RAPL Interface information disclosure0.00CVE-2020-8695
1648324.43.35.5
 
 
Linux CPU Linux kernel Driver information disclosure0.02CVE-2020-8694
1648316.05.36.7
 
 
Intel Ethernet 700 Series Controller Firmware memory corruption0.00CVE-2020-8693
1648305.03.36.7
 
 
Intel Ethernet 700 Series Controller or denial of service0.02CVE-2020-8692
1648295.03.36.7
 
 
Intel Ethernet 700 Series Controller control flow0.01CVE-2020-8691
1648286.05.36.7
 
 
Intel Ethernet 700 Series Controller or protection mechanism0.01CVE-2020-8690
1648273.83.34.4
 
 
Intel Visual Compute Accelerator denial of service0.01CVE-2020-8677
1648266.05.36.7
 
 
Intel Visual Compute Accelerator access control0.00CVE-2020-8676
1648258.57.39.8
 
 
SugarCRM Installation authorization0.02CVE-2020-7472
1648248.06.39.8
 
 
deephas Prototype code injection0.02CVE-2020-28271
1648238.06.39.8
 
 
object-hierarchy-access code injection0.02CVE-2020-28270
1648228.06.39.8
 
 
field Prototype code injection0.02CVE-2020-28269
1648215.45.55.3
 
 
lettre library Sendmail mod.rs injection0.03CVE-2020-28247
1648205.94.37.5
 
 
BAB eibPort lighttpd resource consumption0.00CVE-2020-24573
1648197.87.87.8
 
 
Ivanti Endpoint Manager DLL ldiscn32.exe uncontrolled search path0.00CVE-2020-13771

Do you know our Splunk app?

Download it now for free!