CVSSv3 01/08/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1674566.36.3
 
 
 
IBM Engineering Requirements Quality Assistant On-Premises input validation0.00CVE-2020-4667
1674553.53.5
 
 
 
IBM Engineering Requirements Quality Assistant On-Premises Web UI cross site scripting0.00CVE-2020-4666
1674543.53.5
 
 
 
IBM Engineering Requirements Quality Assistant On-Premises Web UI cross site scripting0.00CVE-2020-4664
1674533.53.5
 
 
 
IBM Engineering Requirements Quality Assistant On-Premises Web UI cross site scripting0.05CVE-2020-4663
1674526.36.3
 
 
 
IBM Security Verify Privilege Manager xml external entity reference0.06CVE-2020-4606
1674513.53.5
 
 
 
Innokas Yhtymä Oy Vital Signs Monitor VC150 cross site scripting0.00CVE-2020-27262
1674502.22.2
 
 
 
Innokas Yhtymä Oy Vital Signs Monitor VC150 HL7 Segment injection0.00CVE-2020-27260
1674495.65.6
 
 
 
pwntools Shellcraft Generator injection0.00CVE-2020-28468
1674486.36.3
 
 
 
Invision Power Services Community Suite Download REST API files.php GETindex sql injection0.00CVE-2021-3025
1674473.53.5
 
 
 
AWBS Advanced Webhost Billing System cross-site request forgery0.05CVE-2020-25950
1674464.34.3
 
 
 
D-Link DSL-2888A One Touch Application passwd information disclosure0.05CVE-2020-24577
1674455.35.3
 
 
 
NVIDIA GPU Display Driver Kernel Mode Layer access control0.04CVE-2021-1056
1674445.35.3
 
 
 
NVIDIA GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape access control0.06CVE-2021-1055
1674433.33.3
 
 
 
NVIDIA GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape improper authorization0.00CVE-2021-1054
1674427.87.8
 
 
 
NVIDIA GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape memory corruption0.00CVE-2021-1053
1674417.87.8
 
 
 
NVIDIA GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape access control0.10CVE-2021-1052
1674407.87.8
 
 
 
NVIDIA GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape memory corruption0.04CVE-2021-1051
1674395.55.5
 
 
 
Mercusys Mercury X18G UPnP Server uhttpd.json pathname traversal0.00CVE-2021-23242
1674383.53.5
 
 
 
Mercusys Mercury X18G Web Server passwd pathname traversal0.05CVE-2021-23241
1674373.53.5
 
 
 
socket.io-parser Large Packet resource consumption0.05CVE-2020-36049
1674364.34.3
 
 
 
Engine.IO POST Request EventEmitter resource consumption0.00CVE-2020-36048
1674355.55.5
 
 
 
PHPGurukul Hospital Management System dashboard.php access control1.58CVE-2020-35745
1674347.37.3
 
 
 
Barco TransForm NDN-210 Lite Web Administration Panel command injection0.00CVE-2020-17500
1674335.55.5
 
 
 
Gotenberg tini permission0.05CVE-2020-13452
1674325.55.5
 
 
 
Gotenberg Office Rendering Engine unknown vulnerability0.05CVE-2020-13451
1674315.55.5
 
 
 
Gotenberg File Upload pathname traversal0.00CVE-2020-13450
1674303.53.5
 
 
 
Gotenberg Markdown Engine pathname traversal0.06CVE-2020-13449
1674296.36.3
 
 
 
Rock RMS unrestricted upload0.04CVE-2019-18643
1674285.55.5
 
 
 
Rock RMS Profile Update resource injection0.05CVE-2019-18642
1674276.36.3
 
 
 
Backdoor.Win32.NinjaSpy.c HTTP PUT cmd.dll buffer overflow0.04
1674266.36.3
 
 
 
Backdoor.Win32.Xtreme.yvp System.exe permission0.05
1674256.36.3
 
 
 
Backdoor.Win32.Agent.dcbh 674_674.exe permission0.04
1674245.05.0
 
 
 
Eaton easySoft E70 File type confusion0.07CVE-2020-6656
1674232.62.6
 
 
 
Eaton easySoft E70 File out-of-bounds read0.07CVE-2020-6655
1674223.73.7
 
 
 
IBM Emptoris Strategic Supply Management inadequate encryption0.04CVE-2020-4898
1674215.35.3
 
 
 
IBM Emptoris Contract Management information exposure0.04CVE-2020-4897
1674207.37.3
 
 
 
IBM Emptoris Sourcing HTTP Request injection0.04CVE-2020-4896
1674193.53.5
 
 
 
IBM Emptoris Strategic Supply Management Web UI cross site scripting0.04CVE-2020-4895
1674183.73.7
 
 
 
IBM Emptoris Strategic Supply Management HTTP GET Request information disclosure0.04CVE-2020-4893
1674173.53.5
 
 
 
IBM Emptoris Contract Management Web UI cross site scripting0.05CVE-2020-4892
1674165.55.5
 
 
 
Linux Kernel infiniband hfi1 Driver use after free0.00CVE-2020-27835
1674155.05.0
 
 
 
Red Hat JBoss Core Services httpd SSL Certificate certificate validation0.06CVE-2020-25680
1674143.53.5
 
 
 
Liferay CMS Portal Calendar cross site scripting0.05CVE-2020-25476
1674133.53.5
 
 
 
Rockwell Automation RSLinx Classic Ethernet IP denial of service0.04CVE-2020-13573
1674126.36.3
 
 
 
Foxit Reader/PhantomPDF Opcode proxyDoAction out-of-bounds read0.00CVE-2018-20316
1674116.36.3
 
 
 
Foxit Reader/PhantomPDF out-of-bounds read0.00CVE-2018-20315
1674106.36.3
 
 
 
Foxit Reader/PhantomPDF proxyCheckLicence out-of-bounds read0.00CVE-2018-20314
1674096.36.3
 
 
 
Foxit Reader/PhantomPDF proxyPreviewAction out-of-bounds read0.00CVE-2018-20313
1674086.36.3
 
 
 
Foxit Reader/PhantomPDF Opcode proxyDoAction out-of-bounds read0.19CVE-2018-20312
1674076.36.3
 
 
 
Foxit Reader/PhantomPDF proxyCPDFAction out-of-bounds read0.05CVE-2018-20311

Want to stay up to date on a daily basis?

Enable the mail alert feature now!