CVSSv3 02/11/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1697775.55.5
 
 
 
is-user-valid ldap injection1.56CVE-2021-23335
1697765.55.5
 
 
 
static-eval FunctionExpressions code injection1.64CVE-2021-23334
1697754.13.74.6
 
 
MongoDB Ops Manager SSL cleartext transmission1.71CVE-2021-20335
1697745.53.57.5
 
 
Fluent Bit flb_avro.c flb_malloc null pointer dereference1.71CVE-2021-27186
1697737.65.59.8
 
 
samba-client Package process.exec command injection1.64CVE-2021-27185
1697725.94.37.5
 
 
FiberHome HG6245D Telnet Daemon denial of service1.42CVE-2021-27179
1697714.92.37.5
 
 
FiberHome HG6245D NVRAM missing encryption1.56CVE-2021-27178
1697708.57.39.8
 
 
FiberHome HG6245D Telnet Server improper authentication1.34CVE-2021-27177
1697695.94.37.5
 
 
FiberHome HG6245D wifictl_5g.cfg permission1.64CVE-2021-27176
1697685.94.37.5
 
 
FiberHome HG6245D wifictl_2g.cfg permission1.71CVE-2021-27175
1697675.94.37.5
 
 
FiberHome HG6245D wifi_custom.cfg permission1.74CVE-2021-27174
1697666.96.37.5
 
 
FiberHome HG6245D API improper authentication1.38CVE-2021-27173
1697657.04.39.8
 
 
FiberHome HG6245D system-config.sh hard-coded password1.79CVE-2021-27172
1697648.98.09.8
 
 
FiberHome HG6245D CLI out-of-bounds write1.52CVE-2021-27171
1697638.57.39.8
 
 
FiberHome HG6245D Firewall access control1.51CVE-2021-27170
1697627.65.59.8
 
 
FiberHome AN5506-04-FA hard-coded password1.95CVE-2021-27169
1697618.06.39.8
 
 
FiberHome HG6245D hard-coded credentials1.88CVE-2021-27168
1697607.65.59.8
 
 
FiberHome HG6245D libci_adaptation_layer.so init_3bb_password hard-coded credentials1.88CVE-2021-27167
1697597.65.59.8
 
 
FiberHome HG6245D hard-coded password1.81CVE-2021-27166
1697588.57.39.8
 
 
FiberHome HG6245D Telnet Daemon hard-coded credentials2.10CVE-2021-27165
1697578.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.31CVE-2021-27164
1697568.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.43CVE-2021-27163
1697558.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.72CVE-2021-27162
1697548.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.36CVE-2021-27161
1697538.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.74CVE-2021-27160
1697528.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.66CVE-2021-27159
1697518.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.74CVE-2021-27158
1697508.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.56CVE-2021-27157
1697498.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.81CVE-2021-27156
1697488.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.28CVE-2021-27155
1697478.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.21CVE-2021-27154
1697468.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.92CVE-2021-27153
1697458.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.43CVE-2021-27152
1697448.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.77CVE-2021-27151
1697438.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.35CVE-2021-27150
1697428.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.57CVE-2021-27149
1697418.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.64CVE-2021-27148
1697408.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.64CVE-2021-27147
1697398.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials2.68CVE-2021-27146
1697388.57.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded credentials1.56CVE-2021-27145
1697378.06.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded password1.91CVE-2021-27144
1697368.06.39.8
 
 
FiberHome HG6245D Web Daemon hard-coded password1.49CVE-2021-27143
1697356.55.57.5
 
 
FiberHome HG6245D Private Key permission1.59CVE-2021-27142
1697347.04.39.8
 
 
FiberHome HG6245D umconfig.txt hard-coded key2.39CVE-2021-27141
1697335.94.37.5
 
 
FiberHome HG6245D web.log log file2.03CVE-2021-27140
1697325.94.37.5
 
 
FiberHome HG6245D info.asp information disclosure1.88CVE-2021-27139
1697315.94.77.2
 
 
Trend Micro Security code injection2.22CVE-2021-25251
1697303.03.52.4
 
 
Elastic APM Agent for Go HTTP Header log file2.39CVE-2021-22133
1697293.73.7
 
 
 
Fleet Request resource consumption1.78CVE-2021-21296
1697282.72.7
 
 
 
Lenovo XClarity Administrator FFDC Service Log cleartext transmission1.81CVE-2020-8355

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!