CVSSv3 02/10/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1696732.42.4
 
 
 
McAfee Endpoint Security ePO Extension cross site scripting0.00CVE-2021-23881
1696727.07.0
 
 
 
McAfee Total Protection Remote Procedure Call privileges management0.05CVE-2021-23876
1696715.35.3
 
 
 
McAfee Total Protection MTP Self-Defense privileges management0.00CVE-2021-23874
1696707.87.8
 
 
 
McAfee Total Protection privileges management0.04CVE-2021-23873
1696694.44.4
 
 
 
McAfee Endpoint Security null pointer dereference0.04CVE-2021-23883
1696684.24.2
 
 
 
McAfee Endpoint Security ENS File privileges management0.06CVE-2021-23882
1696674.24.2
 
 
 
McAfee Endpoint Security privileges management0.00CVE-2021-23880
1696663.33.3
 
 
 
McAfee Endpoint Security cleartext storage0.00CVE-2021-23878
1696653.53.5
 
 
 
Wekan Fieldbleed cross site scripting0.05CVE-2021-20654
1696645.55.5
 
 
 
GENIVI Diagnostic Log and Trace dlt_common.c dlt_buffer_write_block heap-based overflow0.05CVE-2020-36244
1696636.36.3
 
 
 
Monitorr upload.php unrestricted upload0.09CVE-2020-28871
1696625.55.5
 
 
 
InoERP json_fp.php unknown vulnerability0.04CVE-2020-28870
1696617.37.3
 
 
 
Backdoor.Win32.Aphexdoor.LiteSock Service Port 113 moo buffer overflow0.06
1696607.37.3
 
 
 
Backdoor.Win32.NetTerrorist Service Port 785 improper authentication0.00
1696596.36.3
 
 
 
Trojan.Win32.Cafelom.bu DNF-II.exe heap-based overflow0.05
1696587.37.3
 
 
 
Backdoor.Win32.Wollf.15 Service Port 7614 improper authentication0.04
1696576.36.3
 
 
 
Trojan-Spy.Win32.WinSpy.vwl Service Port 443 permission0.00
1696565.35.3
 
 
 
Trojan-Spy.Win32.WebCenter.a Service Port 80 web.exe information disclosure0.00
1696556.36.3
 
 
 
Trojan-Spy.Win32.SpyEyes.awow $Recycle$ permission0.05
1696546.36.3
 
 
 
Trojan-Spy.Win32.SpyEyes.auwl cleansweep.exe permission0.04
1696536.36.3
 
 
 
Trojan-Spy.Win32.SpyEyes.auqj wedfsadeex.exe permission0.05
1696526.36.3
 
 
 
Trojan.Win32.Gentee.h Paltalk permission0.00
1696516.36.3
 
 
 
Trojan.Win32.Gentee.b WINNT permission0.00
1696506.36.3
 
 
 
Trojan.Win32.Delf.uq downsoft permission0.09
1696496.36.3
 
 
 
Email-Worm.Win32.Sircam.eb winupdate.exe permission0.05
1696486.36.3
 
 
 
Trojan.Win32.Cospet.abg Service Port 2185 dir permission0.05
1696476.36.3
 
 
 
Trojan.Win32.Comei.pgo dir permission0.00
1696466.36.3
 
 
 
Backdoor.Win32.RemoteManipulator.brr permission0.05
1696457.37.3
 
 
 
Backdoor.Win32.NetBull.11.b Service Port 23456 mfc42.dll buffer overflow0.05
1696446.36.3
 
 
 
Backdoor.Win32.Xyligan.blp FengYun.dll permission0.08
1696436.36.3
 
 
 
HPE T0986H01 Idelji Web ViewPoint Suite access control0.00CVE-2021-3191
1696425.55.5
 
 
 
Hyper Crate Transfer-Encoding request smuggling0.00CVE-2021-26959
1696415.55.5
 
 
 
xcb Crate cast_event unknown vulnerability0.05CVE-2021-26958
1696403.53.5
 
 
 
xcb Crate change_property out-of-bounds read0.04CVE-2021-26957
1696395.55.5
 
 
 
xcb Crate value unknown vulnerability0.04CVE-2021-26956
1696385.55.5
 
 
 
xcb Crate name unknown vulnerability0.08CVE-2021-26955
1696375.55.5
 
 
 
qwutils Crate Clone insert_slice_clone unknown vulnerability0.04CVE-2021-26954
1696363.53.5
 
 
 
postscript Crate uninitialized pointer0.05CVE-2021-26953
1696355.55.5
 
 
 
ms3d Crate read uninitialized pointer0.00CVE-2021-26952
1696345.55.5
 
 
 
calamine Crate set_len heap-based overflow0.04CVE-2021-26951
1696334.34.3
 
 
 
GNU Screen UTF-8 Encoding encoding.c denial of service0.06CVE-2021-26937
1696325.55.5
 
 
 
SmartFoxServer Console Module javashell.py protection mechanism0.07CVE-2021-26551
1696313.53.5
 
 
 
SmartFoxServer Password server.xml missing encryption0.00CVE-2021-26550
1696303.53.5
 
 
 
SmartFoxServer AdminTool Console cross site scripting0.04CVE-2021-26549
1696294.34.3
 
 
 
Siemens SCALANCE W740/SCALANCE W780 ARP allocation of resources0.00CVE-2021-25666
1696283.53.5
 
 
 
HPE 3500/6200/8200 Management Interface denial of service0.04CVE-2021-25141
1696277.37.3
 
 
 
HPE Moonshot Provisioning Manager khuploadfile.cgi pathname traversal0.04CVE-2021-25140
1696267.37.3
 
 
 
HPE Moonshot Provisioning Manager khuploadfile.cgi stack-based overflow0.00CVE-2021-25139
1696254.34.3
 
 
 
Cscape Project File Parser out-of-bounds read0.04CVE-2021-22663
1696247.37.3
 
 
 
HPE T0662H01 Idelji Web ViewPoint Suite authentication replay0.04CVE-2021-22267

Do you know our Splunk app?

Download it now for free!