CVSSv3 12/28/2020

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1668795.55.5
 
 
 
David Howden Tag readAtomData array index0.07CVE-2020-29245
1668785.55.5
 
 
 
David Howden Tag readTextWithDescrFrame array index0.06CVE-2020-29244
1668775.55.5
 
 
 
David Howden Tag readAPICFrame array index0.04CVE-2020-29243
1668765.55.5
 
 
 
David Howden Tag readPICFrame array index0.00CVE-2020-29242
1668752.12.1
 
 
 
Panasonic Security System WV-S2231L Admin Control Panel set_factory denial of service0.00CVE-2020-29194
1668744.34.3
 
 
 
Panasonic Security System WV-S2231L hard-coded password0.06CVE-2020-29193
1668734.64.6
 
 
 
Zammad REST API Call access control0.00CVE-2020-29160
1668725.55.5
 
 
 
Zammad privileges management0.05CVE-2020-29159
1668715.55.5
 
 
 
Zammad Ticket Detail View access control0.08CVE-2020-29158
1668706.66.6
 
 
 
Foscam FHD X1 Local Privilege Escalation0.00CVE-2020-28096
1668695.55.5
 
 
 
Tenda AC1200 Download unknown vulnerability0.00CVE-2020-28094
1668686.36.3
 
 
 
Tenda AC1200 hard-coded password0.09CVE-2020-28093
1668673.53.5
 
 
 
Zammad Tags Element cross site scripting0.06CVE-2020-26035
1668663.53.5
 
 
 
Zammad Create User information disclosure0.05CVE-2020-26034
1668653.53.5
 
 
 
Zammad REST API cross-site request forgery0.00CVE-2020-26033
1668645.55.5
 
 
 
Zammad Massenversand server-side request forgery0.04CVE-2020-26032
1668636.56.5
 
 
 
Zammad Global Search permission0.05CVE-2020-26031
1668626.56.5
 
 
 
Zammad SSO Endpoint improper authentication0.05CVE-2020-26030
1668615.55.5
 
 
 
Zammad X-On-Behalf-Of Header improper authorization0.00CVE-2020-26029
1668605.55.5
 
 
 
Zammad Ticket permission0.08CVE-2020-26028
1668595.55.5
 
 
 
Wavpack pack_utils.c WavpackPackSamples out-of-bounds write0.00CVE-2020-35738
1668583.53.5
 
 
 
Dan McDougall GateOne pathname traversal0.06CVE-2020-35736
1668574.34.3
 
 
 
Automattic WooCommerce Plugin Order Status fetch_order_status information disclosure0.06CVE-2020-29156

Do you need the next level of professionalism?

Upgrade your account now!