CVSSv3 01/28/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1688593.53.5
 
 
 
NEC Aterm WG2600HP/Aterm WG2600HP2 cross site scripting0.00CVE-2021-20622
1688583.53.5
 
 
 
NEC Aterm WG2600HP/Aterm WG2600HP2 cross-site request forgery0.00CVE-2021-20621
1688573.53.5
 
 
 
NEC Aterm WF800HP cross site scripting0.00CVE-2021-20620
1688566.36.3
 
 
 
Logstorage/ELC Analytics Log File os command injection0.01CVE-2020-5626
1688553.53.5
 
 
 
Mautic Referer Header cross site scripting0.01CVE-2020-35124
1688545.35.3
 
 
 
Atlassian Bamboo Endpoint chart information disclosure0.08CVE-2021-26067
1688536.36.3
 
 
 
Accfly Wireless Security IR Camera System 720P Update Procedure FtpLogin stack-based overflow0.05CVE-2020-25785
1688526.36.3
 
 
 
Accfly Wireless Security IR Camera System 720P Message SubOprMsg stack-based overflow0.01CVE-2020-25784
1688516.36.3
 
 
 
Accfly Wireless Security IR Camera System 720P Message OprMsg heap-based overflow0.01CVE-2020-25783
1688506.36.3
 
 
 
Accfly Wireless Security IR Camera 720P Message ServerIP_Proto_Set stack-based overflow0.01CVE-2020-25782
1688496.36.3
 
 
 
WinSCP URL injection0.05CVE-2021-3331
1688484.34.3
 
 
 
GNU C Library ISO-2022-JP-3 Encoding denial of service0.00CVE-2021-3326
1688477.37.3
 
 
 
Monitorix Basic Authentication improper authentication0.04CVE-2021-3325
1688463.53.5
 
 
 
DzzOffice ajax.php cross site scripting0.01CVE-2021-3318
1688455.55.5
 
 
 
GoDaddy node-config-shield set Command cli.js access control0.03CVE-2021-26276
1688445.55.5
 
 
 
Apache ActiveMQ Artemis OpenWire Protocol access control0.00CVE-2021-26118
1688436.36.3
 
 
 
Apache ActiveMQ/ActiveMQ Artemis LDAP Login Module improper authentication0.06CVE-2021-26117
1688426.36.3
 
 
 
HTCondor Job improper authentication0.00CVE-2021-25312
1688415.55.5
 
 
 
HTCondor condor_credd pathname traversal0.00CVE-2021-25311
1688406.36.3
 
 
 
Trend Micro HouseCall for Home Networks access control0.00CVE-2021-25247
1688394.34.3
 
 
 
Trend Micro ServerProtect Scan Engine resource consumption0.06CVE-2021-25226
1688384.34.3
 
 
 
Trend Micro ServerProtect Scheduled Scan denial of service0.01CVE-2021-25225
1688374.34.3
 
 
 
Trend Micro ServerProtect Manual Scan denial of service0.00CVE-2021-25224
1688366.36.3
 
 
 
Fuji Electric Tellus Lite V-Simulator/V-Server Lite Project File out-of-bounds read0.01CVE-2021-22655
1688356.36.3
 
 
 
Fuji Electric Tellus Lite V-Simulator/V-Server Lite Project File out-of-bounds write0.04CVE-2021-22653
1688346.36.3
 
 
 
Fuji Electric Tellus Lite V-Simulator/V-Server Lite Project File heap-based overflow0.04CVE-2021-22641
1688336.36.3
 
 
 
Fuji Electric Tellus Lite V-Simulator/V-Server Lite Project File uninitialized pointer0.01CVE-2021-22639
1688326.36.3
 
 
 
Fuji Electric Tellus Lite V-Simulator/V-Server Lite Project File stack-based overflow0.05CVE-2021-22637
1688313.53.5
 
 
 
IBM Jazz Foundation Web UI cross site scripting0.07CVE-2021-20357
1688304.64.6
 
 
 
Vmware Spring Cloud Task TaskExplorer sql injection0.07CVE-2020-5428
1688294.74.7
 
 
 
Vmware Spring Cloud Data Flow Task Execution sql injection0.00CVE-2020-5427
1688283.13.1
 
 
 
IBM Cloud Pak for Security HTTP Header information disclosure0.05CVE-2020-4967
1688278.88.8
 
 
 
IBM Security Guardium access control0.05CVE-2020-4952
1688263.53.5
 
 
 
IBM Jazz Foundation Web UI cross site scripting0.06CVE-2020-4865
1688253.53.5
 
 
 
IBM Jazz Foundation Web UI cross site scripting0.06CVE-2020-4855
1688244.34.3
 
 
 
IBM Cloud Pak for Security Web UI cross site scripting0.00CVE-2020-4820
1688233.13.1
 
 
 
IBM Cloud Pak for Security cleartext transmission0.00CVE-2020-4816
1688225.35.3
 
 
 
IBM Cloud Pak for Security HTTP Response Header information disclosure0.00CVE-2020-4815
1688214.34.3
 
 
 
IBM QRadar SIEM path traversal0.04CVE-2020-4789
1688204.74.7
 
 
 
IBM QRadar SIEM server-side request forgery0.03CVE-2020-4787
1688196.36.3
 
 
 
IBM QRadar SIEM server-side request forgery0.07CVE-2020-4786
1688185.35.3
 
 
 
IBM Cloud Pak for Security information exposure0.06CVE-2020-4628
1688173.53.5
 
 
 
IBM Jazz Foundation clickjacking0.05CVE-2020-4547
1688163.53.5
 
 
 
IBM Jazz Foundation Web UI cross site scripting0.18CVE-2020-4524
1688154.34.3
 
 
 
IBM Security Guardium Response Header information disclosure0.01CVE-2020-4189
1688142.42.4
 
 
 
BDTASK Multi-Store Inventory Management System cross site scripting0.06CVE-2020-36012
1688136.36.3
 
 
 
PHPList Hash comparison0.05CVE-2020-23361
1688127.37.3
 
 
 
osCommerce User Registration administrators.php comparison0.48CVE-2020-23360
1688116.36.3
 
 
 
WeBid Registration newuser.php comparison0.05CVE-2020-23359
1688105.05.0
 
 
 
Nibbleblog Hash login.class.phpin improper authentication0.00CVE-2020-23356

Might our Artificial Intelligence support you?

Check our Alexa App!