CVSSv3 01/09/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1675296.36.3
 
 
 
Google Chrome Audio buffer overflow0.08CVE-2021-21116
1675285.05.0
 
 
 
Google Chrome Safe Browsing use after free0.09CVE-2021-21115
1675276.36.3
 
 
 
Google Chrome Audio use after free0.00CVE-2021-21114
1675266.36.3
 
 
 
Google Chrome Skia buffer overflow0.04CVE-2021-21113
1675256.36.3
 
 
 
Google Chrome Blink use after free0.09CVE-2021-21112
1675245.05.0
 
 
 
Google Chrome Policy Enforcement sandbox0.09CVE-2021-21111
1675236.36.3
 
 
 
Google Chrome HTML Page use after free0.09CVE-2021-21110
1675225.05.0
 
 
 
Google Chrome Payments use after free0.04CVE-2021-21109
1675215.05.0
 
 
 
Google Chrome Renderer Process use after free0.09CVE-2021-21108
1675205.05.0
 
 
 
Google Chrome Renderer Process use after free0.00CVE-2021-21107
1675196.36.3
 
 
 
Google Chrome Autofill use after free0.09CVE-2021-21106
1675185.35.3
 
 
 
SonicWALL NetExtender Client unquoted search path0.00CVE-2020-5147
1675175.55.5
 
 
 
SonicWall SMA100 HTTP POST os command injection0.05CVE-2020-5146
1675165.35.3
 
 
 
IBM Spectrum Protect Plus VDAP Proxy information disclosure0.00CVE-2020-5022
1675155.65.6
 
 
 
IBM Spectrum Protect Plus Session password recovery0.00CVE-2020-5021
1675144.34.3
 
 
 
IBM Spectrum Protect Plus clickjacking0.04CVE-2020-5020
1675134.34.3
 
 
 
IBM Spectrum Protect Plus HTTP Host Header cross site scripting0.05CVE-2020-5019
1675123.13.1
 
 
 
IBM Spectrum Protect Plus URL information disclosure0.00CVE-2020-5018
1675112.72.7
 
 
 
IBM Spectrum Protect Plus permission0.04CVE-2020-5017
1675103.53.5
 
 
 
IBM Jazz Foundation Web UI cross site scripting0.05CVE-2020-4733
1675093.53.5
 
 
 
IBM Jazz Foundation Web UI cross site scripting0.04CVE-2020-4697
1675083.53.5
 
 
 
IBM Jazz Foundation Web UI cross site scripting0.04CVE-2020-4691
1675074.34.3
 
 
 
IBM Jazz Foundation information exposure0.09CVE-2020-4544
1675064.34.3
 
 
 
IBM Jazz Foundation information exposure0.04CVE-2020-4487
1675056.36.3
 
 
 
Cockpit JSON Data Database.php injection0.05CVE-2020-35131
1675043.53.5
 
 
 
Rocket.Chat Password Reset information disclosure0.04CVE-2020-28208
1675036.36.3
 
 
 
VideoLAN VLC Media Player MKV File send heap-based overflow0.09CVE-2020-26664
1675023.73.7
 
 
 
Dell Inspiron 5675 UEFI BIOS memory corruption0.06CVE-2020-26186
1675012.62.6
 
 
 
Ceph mgr module cleartext storage0.00CVE-2020-25678
1675004.74.7
 
 
 
Barco NDN-210 Web Administration Panel ngpsystemcmd.php command injection0.04CVE-2020-17504
1674996.36.3
 
 
 
Barco NDN-210 Web Administration Panel split_card_cmd.php command injection0.00CVE-2020-17503
1674986.36.3
 
 
 
Barco TransForm N Web Administration Panel split_card_cmd.php command injection0.06CVE-2020-17502
1674976.36.3
 
 
 
Google Chrome Network Traffic access control0.05CVE-2020-16043
1674966.36.3
 
 
 
Google Chrome HTML Page Remote Code Execution0.07CVE-2020-16036
1674955.05.0
 
 
 
Google Chrome Remote Code Execution0.05CVE-2020-16035
1674945.35.3
 
 
 
Google Chrome WebRTC Local Privilege Escalation0.04CVE-2020-16034
1674934.34.3
 
 
 
Google Chrome UI unknown vulnerability0.05CVE-2020-16033
1674924.34.3
 
 
 
Google Chrome Omnibox clickjacking0.05CVE-2020-16032
1674914.34.3
 
 
 
Google Chrome Omnibox clickjacking0.04CVE-2020-16031
1674904.34.3
 
 
 
Google Chrome Blink cross site scripting0.09CVE-2020-16030
1674896.36.3
 
 
 
Google Chrome PDFium Remote Code Execution0.00CVE-2020-16029
1674886.36.3
 
 
 
Google Chrome WebRTC heap-based overflow0.00CVE-2020-16028
1674874.34.3
 
 
 
Google Chrome Developer Tools information disclosure0.05CVE-2020-16027
1674866.36.3
 
 
 
Google Chrome WebRTC use after free0.05CVE-2020-16026
1674856.36.3
 
 
 
Google Chrome Clipboard heap-based overflow0.04CVE-2020-16025
1674846.36.3
 
 
 
Google Chrome UI buffer overflow0.05CVE-2020-16024
1674836.36.3
 
 
 
Google Chrome WebCodecs use after free0.04CVE-2020-16023
1674826.36.3
 
 
 
Google Chrome Firewall Controls protection mechanism0.04CVE-2020-16022
1674815.05.0
 
 
 
Google Chrome Image Burner access control0.04CVE-2020-16021
1674805.05.0
 
 
 
Google Chrome cryptohome access control0.09CVE-2020-16020

Do you know our Splunk app?

Download it now for free!