CVSSv3 02/09/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1704368.88.8
 
8.8
 
Microsoft Windows Extended Protection for Authentication improper authentication5.73-CVE-2020-17162
1695306.56.5
 
6.5
 
Microsoft Windows Trust Verification API denial of service1.50CVE-2021-24080
1695299.89.8
 
9.8
 
Microsoft Windows TCP/IP Remote Code Execution1.94CVE-2021-24094
1695289.89.8
 
9.8
 
Microsoft Windows TCP/IP Remote Code Execution1.84CVE-2021-24074
1695277.57.5
 
7.5
 
Microsoft Windows TCP/IP denial of service1.45CVE-2021-24086
1695267.57.5
 
7.5
 
Microsoft Windows Remote Procedure Call information disclosure1.30CVE-2021-1734
1695258.88.8
 
8.8
 
Microsoft Windows Local Spooler Remote Privilege Escalation1.40CVE-2021-24088
1695244.34.3
 
4.3
 
Microsoft Windows Microsoft.PowerShell.Utility Module protection mechanism1.65CVE-2021-24082
1695237.87.8
 
7.8
 
Microsoft Windows PKU2U Local Privilege Escalation1.65CVE-2021-25195
1695224.43.3
 
5.5
 
Microsoft Windows PFX Encryption Security protection mechanism1.45CVE-2021-1731
1695216.86.8
 
6.8
 
Microsoft Windows Network File System denial of service1.25CVE-2021-24075
1695205.55.5
 
5.5
 
Microsoft Windows Mobile Device Management information disclosure1.25CVE-2021-24084
1695197.87.8
 
7.8
 
Microsoft Windows Win32 Win32k Local Privilege Escalation1.24CVE-2021-1698
1695187.87.8
 
7.8
 
Microsoft Windows Win32k Local Privilege Escalation1.62CVE-2021-1732
1695177.87.8
 
7.8
 
Microsoft Windows Kernel Local Privilege Escalation1.46CVE-2021-24096
1695167.87.8
 
7.8
 
Microsoft Windows Installer Local Privilege Escalation1.38CVE-2021-1727
1695157.87.8
 
7.8
 
Microsoft Windows Event Tracing Local Privilege Escalation1.35CVE-2021-24103
1695147.87.8
 
7.8
 
Microsoft Windows Event Tracing Local Privilege Escalation0.91CVE-2021-24102
1695134.43.3
 
5.5
 
Microsoft Windows DirectX information disclosure1.21CVE-2021-24106
1695127.87.8
 
7.8
 
Microsoft Windows Defender Local Privilege Escalation1.36CVE-2021-24092
1695115.55.5
 
5.5
 
Microsoft Windows Console Driver denial of service1.09CVE-2021-24098
1695105.55.5
 
5.5
 
Microsoft Windows Backup Engine information disclosure1.30CVE-2021-24079
1695097.06.3
 
7.8
 
Microsoft Windows Address Book Remote Code Execution1.62CVE-2021-24083
1695087.06.3
 
7.8
 
Microsoft Visual Studio Code npm-script Extension Remote Code Execution1.42CVE-2021-26700
1695076.05.0
 
7.0
 
Microsoft Visual Studio Remote Code Execution1.24CVE-2021-1639
1695068.88.8
 
8.8
 
Microsoft System Center Operations Manager Remote Privilege Escalation1.40CVE-2021-1728
1695057.87.8
 
7.8
 
Microsoft Sysinternals PsExec Local Privilege Escalation1.36CVE-2021-1733
1695046.56.5
 
6.5
 
Microsoft Lync Server/Skype for Business Server denial of service1.15CVE-2021-24099
1695036.56.5
 
6.5
 
Microsoft Lync Server/Skype for Business Server unknown vulnerability0.96CVE-2021-24073
1695028.18.1
 
8.1
 
Microsoft Windows Fax Service Remote Code Execution1.32CVE-2021-1722
1695019.89.8
 
9.8
 
Microsoft Windows Fax Service Remote Code Execution1.39CVE-2021-24077
1695005.55.5
 
5.5
 
Microsoft Windows VMSwitch information disclosure1.30CVE-2021-24076
1694999.89.8
 
9.8
 
Microsoft Windows DNS Server Remote Code Execution1.68CVE-2021-24078
1694988.38.8
 
7.8
 
Microsoft Windows Remote Code Execution1.35CVE-2021-24091
1694978.38.8
 
7.8
 
Microsoft Windows Codecs Library Remote Code Execution1.37CVE-2021-24081
1694965.75.7
 
5.7
 
Microsoft Teams information disclosure1.10CVE-2021-24114
1694958.88.8
 
8.8
 
Microsoft SharePoint Remote Privilege Escalation1.44CVE-2021-24072
1694948.88.8
 
8.8
 
Microsoft SharePoint Remote Privilege Escalation0.86CVE-2021-24066
1694938.08.0
 
8.0
 
Microsoft SharePoint Remote Privilege Escalation0.95CVE-2021-1726
1694924.23.1
 
5.3
 
Microsoft SharePoint information disclosure1.00CVE-2021-24071
1694917.06.3
 
7.8
 
Microsoft Office Remote Code Execution1.34CVE-2021-24070
1694907.06.3
 
7.8
 
Microsoft Office Remote Code Execution1.00CVE-2021-24069
1694897.06.3
 
7.8
 
Microsoft Office Remote Code Execution1.24CVE-2021-24068
1694887.06.3
 
7.8
 
Microsoft Office Remote Code Execution1.05CVE-2021-24067
1694878.88.8
 
8.8
 
Microsoft Windows Graphics Remote Code Execution1.28CVE-2021-24093
1694865.45.4
 
5.4
 
Microsoft Exchange Server unknown vulnerability1.78CVE-2021-1730
1694856.56.5
 
6.5
 
Microsoft Exchange Server Remote Privilege Escalation0.42CVE-2021-24085
1694843.92.8
 
5.0
 
Microsoft Edge information disclosure0.57CVE-2021-24100
1694834.73.4
 
6.1
 
Microsoft Dynamics NAV/Dynamics 365 Business Central cross site scripting0.61CVE-2021-1724
1694826.56.5
 
6.5
 
Microsoft Dynamics 365 information disclosure1.05CVE-2021-24101

Might our Artificial Intelligence support you?

Check our Alexa App!