CVSSv3 03/05/2021

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1707787.65.59.8
 
 
internment Crate memory corruption0.00CVE-2021-28037
1707776.55.57.5
 
 
quinn Crate SocketAddrV6 memory corruption0.09CVE-2021-28036
1707767.65.59.8
 
 
stack_dst Crate push_inner uninitialized pointer0.00CVE-2021-28035
1707757.65.59.8
 
 
stack_dst Crate push_inner double free0.00CVE-2021-28034
1707747.65.59.8
 
 
byte_struct Crate deserialization0.05CVE-2021-28033
1707737.65.59.8
 
 
nano_arena Crate split_at out-of-bounds write0.07CVE-2021-28032
1707727.65.59.8
 
 
scratchpad Crate move_elements double free0.00CVE-2021-28031
1707715.53.57.5
 
 
truetype Crate take_bytes uninitialized pointer0.00CVE-2021-28030
1707705.53.57.5
 
 
toodee Crate Row Insert uninitialized pointer0.00CVE-2021-28029
1707697.65.59.8
 
 
toodee Crate Row Insert double free0.00CVE-2021-28028
1707687.65.59.8
 
 
bam Crate bgzip Block Load out-of-bounds write0.00CVE-2021-28027
1707675.24.36.1
 
 
SUSE Rancher cross site scripting0.06CVE-2021-25313
1707664.83.56.1
 
 
Movable Type Add Asset Screen cross site scripting0.00CVE-2021-20665
1707654.83.56.1
 
 
Movable Type Asset Registration Screen cross site scripting0.00CVE-2021-20664
1707644.83.56.1
 
 
Movable Type Role Authority Setting cross site scripting0.00CVE-2021-20663
1707637.65.59.8
 
 
Zoho ManageEngine Application Control Plus Nginx Configuration Setting access control0.01CVE-2020-29658
1707624.53.75.3
 
 
activerecord-session_store timing discrepancy0.05CVE-2019-25025
1707617.65.59.8
 
 
MSI Dragon Center IOCTL Request MsIo64.sys buffer overflow0.07CVE-2021-27965
1707608.06.39.8
 
 
SonLogger POST Request SaveUploadedHotspotLogoFile unrestricted upload0.01CVE-2021-27964
1707597.77.38.2
 
 
SonLogger POST Request saveUser improper authentication0.06CVE-2021-27963
1707587.77.38.2
 
 
SonicWALL Directory Services Connector SSO Agent improper authentication0.00CVE-2020-5148
1707576.96.37.5
 
 
IdentityModel Branca improper authentication0.00CVE-2020-36255
1707566.97.36.5
 
 
Sangoma Asterisk SIP Request chan_sip.c improper authentication0.00CVE-2019-18351
1707557.06.37.8
 
 
ytnef File ytnef.c SwapWord heap-based overflow0.00CVE-2021-3404
1707547.06.37.8
 
 
ytnef ytnef.c TNEFSubjectHandler double free0.00CVE-2021-3403
1707538.57.39.8
 
 
Doctor Appointment System admin.php sql injection0.00CVE-2021-27314
1707523.93.54.4
 
 
Yubico yubihsm-shell _send_secure_msg out-of-bounds read0.06CVE-2021-27217
1707515.44.36.5
 
 
NetApp Clustered Data ONTAP SMB Access denial of service0.07CVE-2021-26989
1707503.53.53.5
 
 
NetApp Clustered Data ONTAP information disclosure0.00CVE-2021-26988
1707497.65.59.8
 
 
AfterLogic Aurora/WebMail Pro DAV DAVServer.php pathname traversal0.00CVE-2021-26293
1707485.86.35.3
 
 
Joomla! Form Filter input validation0.00CVE-2021-26029
1707475.55.55.5
 
 
Joomla! ZIP Package path traversal0.08CVE-2021-26028
1707465.45.55.3
 
 
Joomla! Category exposure of resource0.00CVE-2021-26027
1707453.34.12.4
 
 
Samsung Internet Permission permission0.05CVE-2021-25348
1707445.35.3
 
 
 
Samsung Mobile Device Email App improper authentication0.00CVE-2021-25347
1707438.06.39.8
 
 
Samsung Mobile Device quram Library memory corruption0.08CVE-2021-25346
1707424.94.35.5
 
 
Samsung Mobile Device hwcomposer denial of service0.00CVE-2021-25345
1707414.43.35.5
 
 
Samsung Mobile Device knox_custom Service permission0.05CVE-2021-25344
1707404.76.13.3
 
 
Samsung Mobile Device memory corruption0.00CVE-2021-25343
1707393.33.33.3
 
 
Samsung SMP SDK Provider denial of service0.00CVE-2021-25342
1707383.74.03.3
 
 
Samsung S Assistant denial of service0.00CVE-2021-25341
1707373.44.32.4
 
 
Samsung Mobile Device Keyboard access control0.04CVE-2021-25340
1707365.76.15.2
 
 
Samsung Mobile Devices HArx memory corruption0.00CVE-2021-25339
1707355.76.15.2
 
 
Samsung Mobile Devices RKP access control0.05CVE-2021-25338
1707345.94.87.1
 
 
Samsung Mobile Devices Clipboard Service access control0.00CVE-2021-25337
1707334.14.83.3
 
 
Samsung Mobile Devices NotificationManagerService privileges management0.05CVE-2021-25336
1707322.42.42.5
 
 
Samsung Mobile Devices Lockscreen access control0.00CVE-2021-25335
1707315.05.0
 
 
 
Samsung Mobile Devices Application denial of service0.00CVE-2021-25334
1707302.22.12.4
 
 
Samsung Pay Mini Application Lockscreen access control0.00CVE-2021-25333
1707292.42.42.4
 
 
Samsung Pay Mini Application Lockscreen access control0.00CVE-2021-25332

Might our Artificial Intelligence support you?

Check our Alexa App!