CVSSv3 04/07/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1725826.36.3
 
 
 
GNU Chess PGN cmd.cc cmd_pgnreplay buffer overflow0.00CVE-2021-30184
1725815.55.5
 
 
 
GNOME file-roller Extraction fr-archive-libarchive.c pathname traversal0.00CVE-2020-36314
1725806.36.3
 
 
 
PHP-Nuke User Registration sql injection0.06CVE-2021-30177
1725797.37.3
 
 
 
D-Link DSL-320B-D1 login.xgi buffer overflow0.13CVE-2021-26709
1725785.55.5
 
 
 
EikiSoft Archive Collectively Operation Utility ZIP Archive pathname traversal0.05CVE-2021-20692
1725773.53.5
 
 
 
Yomi-Search cross site scripting0.00CVE-2021-20691
1725763.53.5
 
 
 
Yomi-Search cross site scripting0.00CVE-2021-20690
1725753.53.5
 
 
 
Yomi-Search cross site scripting0.00CVE-2021-20689
1725743.53.5
 
 
 
Click Ranker cross site scripting0.00CVE-2021-20688
1725733.53.5
 
 
 
Kagemai cross-site request forgery0.00CVE-2021-20687
1725723.53.5
 
 
 
Kagemai cross site scripting0.05CVE-2021-20686
1725713.53.5
 
 
 
Kagemai cross site scripting0.05CVE-2021-20685
1725703.53.5
 
 
 
MagazinegerZ cross site scripting0.00CVE-2021-20684
1725697.87.8
 
 
 
Qualcomm Snapdragon Compute IO Control memory corruption0.00CVE-2021-1892
1725687.57.5
 
 
 
Qualcomm Snapdragon Auto RTCP Packet denial of service0.00CVE-2020-11255
1725671.91.9
 
 
 
Qualcomm Snapdragon Auto TrustZone information disclosure0.00CVE-2020-11252
1725667.37.3
 
 
 
Qualcomm Snapdragon Auto DTMF Payload out-of-bounds read0.07CVE-2020-11251
1725656.36.3
 
 
 
Qualcomm Snapdragon Auto out-of-bounds read0.00CVE-2020-11247
1725647.87.8
 
 
 
Qualcomm Snapdragon Auto Suspend Mode double free0.00CVE-2020-11246
1725637.87.8
 
 
 
Qualcomm Snapdragon Auto NS EL2 access control0.00CVE-2020-11245
1725625.35.3
 
 
 
Qualcomm Snapdragon Auto RRC denial of service0.00CVE-2020-11243
1725617.87.8
 
 
 
Qualcomm Snapdragon Industrial IOT/Snapdragon Mobile SDI Local Privilege Escalation0.13CVE-2020-11242
1725607.87.8
 
 
 
Qualcomm Snapdragon Auto Histogram memory corruption0.00CVE-2020-11237
1725597.87.8
 
 
 
Qualcomm Snapdragon Auto Dimensions memory corruption0.05CVE-2020-11236
1725587.87.8
 
 
 
Qualcomm Snapdragon Auto Socket Event use after free0.10CVE-2020-11234
1725576.76.7
 
 
 
Qualcomm Snapdragon Compute Thread heap-based overflow0.06CVE-2020-11231
1725567.87.8
 
 
 
Qualcomm Snapdragon Connectivity RPM memory corruption0.00CVE-2020-11210
1725557.37.3
 
 
 
Qualcomm Snapdragon Auto SDP out-of-bounds read0.05CVE-2020-11191
1725543.53.5
 
 
 
Linux Kernel SynIC Hyper-V hyperv.c synic_get null pointer dereference0.06CVE-2021-30178
1725533.53.5
 
 
 
DMA Softlab Radius Manager admin.php cross-site request forgery0.06CVE-2021-30147
1725525.55.5
 
 
 
Linux Kernel KVM Subsystem kvm-s390.c unknown vulnerability0.05CVE-2020-36313
1725513.53.5
 
 
 
Linux Kernel kvm_main.c kvm_io_bus_unregister_dev memory leak0.31CVE-2020-36312
1725503.53.5
 
 
 
Linux Kernel SEV VM sev.c denial of service0.06CVE-2020-36311
1725493.53.5
 
 
 
Linux Kernel svm.c set_memory_region_test infinite loop0.12CVE-2020-36310
1725485.55.5
 
 
 
Proofpoint Insider Threat Management Server Web Console improper authorization0.00CVE-2021-27900
1725475.65.6
 
 
 
Proofpoint Insider Threat Management Agents channel accessible0.00CVE-2021-27899
1725463.53.5
 
 
 
Teradici PCoIP Connection Manager and Security Gateway log file0.07CVE-2021-25692
1725455.55.5
 
 
 
Proofpoint Insider Threat Management Server Web Console xml external entity reference0.22CVE-2021-22158
1725443.53.5
 
 
 
Proofpoint Insider Threat Management Server cross site scripting0.05CVE-2021-22157
1725435.05.0
 
 
 
projen Project Configuration Remote Privilege Escalation0.00CVE-2021-21423
1725423.53.5
 
 
 
Syncthing Relay Messages denial of service0.00CVE-2021-21404
1725415.55.5
 
 
 
ngx_http_lua_module API unknown vulnerability0.00CVE-2020-36309
1725405.55.5
 
 
 
OpenIAM permission0.00CVE-2020-13422
1725395.55.5
 
 
 
OpenIAM access control0.06CVE-2020-13421
1725386.36.3
 
 
 
OpenIAM Groovy Script Remote Privilege Escalation0.51CVE-2020-13420
1725375.55.5
 
 
 
OpenIAM Batch pathname traversal0.00CVE-2020-13419
1725363.53.5
 
 
 
OpenIAM Add New User cross site scripting0.00CVE-2020-13418
1725353.53.5
 
 
 
Seafile Share of Library cross site scripting0.05CVE-2021-30146
1725343.53.5
 
 
 
LiquidFiles Send Email cross site scripting0.76CVE-2021-30140
1725333.53.5
 
 
 
phpseclib RSA PKCS#1 v1.5 Signature Verification signature verification0.00CVE-2021-30130

Want to stay up to date on a daily basis?

Enable the mail alert feature now!