CVSSv3 04/15/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDVendResVulnerabilityCTICVE
1731105.35.3
 
 
 
Apache Tapestry AppModule.class deserialization0.00CVE-2021-27850
1731096.36.3
 
 
 
PHPGurukul Beauty Parlour Management System add-services.php sql injection0.01CVE-2021-27545
1731083.53.5
 
 
 
PHPGurukul Beauty Parlour Management Syste add-services.php cross site scripting0.00CVE-2021-27544
1731074.43.55.4
 
 
CASAP Automated Enrollment System Students cross site scripting0.00CVE-2021-27129
1731067.87.8
 
 
 
McAfee Data Loss Prevention hdlphook Driver privileges management0.07CVE-2021-23887
1731055.55.5
 
 
 
McAfee Data Loss Prevention hdlphook Driver denial of service0.00CVE-2021-23886
1731042.42.4
 
 
 
McAfee Content Security Reporter ePO Extension cleartext transmission0.00CVE-2021-23884
1731035.35.3
 
 
 
Google Android pb_encode.c pb_write out-of-bounds write0.01CVE-2021-0488
1731023.73.7
 
 
 
McAfee Endpoint Security/Global Threat Intelligence DNS cleartext transmission0.00CVE-2020-7308
1731013.33.3
 
 
 
McAfee Advanced Threat Defense HTTP Request Parameter information disclosure0.06CVE-2020-7270
1731003.53.5
 
 
 
McAfee Advanced Threat Defense HTTP Request Parameter information disclosure0.06CVE-2020-7269
1730995.55.5
 
 
 
Adobe Digital Editions access control0.00CVE-2021-21100
1730983.13.52.7
 
 
Zulip Server Topic Moving API permission assignment0.05CVE-2021-30487
1730975.45.55.3
 
 
Zulip Server all_public_streams API access control0.05CVE-2021-30479
1730964.95.54.3
 
 
Zulip Server permission0.05CVE-2021-30478
1730954.95.54.3
 
 
Zulip Server Webhook access control0.05CVE-2021-30477
1730946.36.3
 
 
 
Jazzband Django Debug Toolbar SQL Panel sql injection0.00CVE-2021-30459
1730934.34.3
 
 
 
Intelbras WIN 300/WRN 342 source code0.00CVE-2021-3017
1730926.36.3
 
 
 
AjaxSearchPro Administration Panel deserialization0.05CVE-2021-29654
1730915.35.3
 
 
 
Pi-hole privileges management0.06CVE-2021-29449
1730903.53.5
 
 
 
Deark fmtutil.c divide by zero0.00CVE-2021-28856
1730894.53.55.5
 
 
Deark deark-dbuf.c dbuf_write null pointer dereference0.00CVE-2021-28855
1730887.87.8
 
 
 
TIBCO Messaging Eclipse Mosquitto Distribution Installation access control0.07CVE-2021-28826
1730875.55.5
 
 
 
TIBCO Messaging Eclipse Mosquitto Distribution Installation access control0.06CVE-2021-28825
1730863.53.5
 
 
 
YubiHSM yubihsm-connector Endpoint infinite loop0.00CVE-2021-28484
1730854.74.7
 
 
 
Devolutions Server/Server LTS delete sql injection0.05CVE-2021-28157
1730845.86.35.3
 
 
Group Office URL Parameter upload.php server-side request forgery0.07CVE-2021-28060
1730836.36.3
 
 
 
Devolutions Server/Server LTS HTML Page unknown vulnerability0.00CVE-2021-28048
1730826.36.3
 
 
 
TOTOLINK X5000R/A720R HTTP Request os command injection0.06CVE-2021-27710
1730816.36.3
 
 
 
TOTOLINK X5000R/A720R HTTP Request os command injection0.07CVE-2021-27708
1730802.32.3
 
 
 
Parallels Desktop Toolgate out-of-bounds read0.05CVE-2021-27260
1730797.87.8
 
 
 
Parallels Desktop Toolgate integer overflow0.06CVE-2021-27259
1730787.37.3
 
 
 
SolarWinds Orion Platform SaveUserSetting Endpoint access control0.00CVE-2021-27258
1730778.88.8
 
 
 
Netgear Nighthawk R7800 apply_bind.cgi heap-based overflow0.12CVE-2021-27253
1730768.88.8
 
 
 
Netgear R7800 DHCP os command injection0.00CVE-2021-27252
1730757.57.5
 
 
 
Netgear Nighthawk R7800 Update cleartext transmission0.12CVE-2021-27251
1730744.34.3
 
 
 
D-Link DAP-2020 CGI Script file inclusion0.05CVE-2021-27250
1730738.88.8
 
 
 
D-Link DAP-2020 CGI Script os command injection0.00CVE-2021-27249
1730728.88.8
 
 
 
D-Link DAP-2020 CGI Script stack-based overflow0.06CVE-2021-27248
1730714.34.3
 
 
 
Tencent WeChat Desktop out-of-bounds read0.08CVE-2021-27247
1730708.88.8
 
 
 
TP-LINK Archer A7 AC1750 tdpServer Endpoint stack-based overflow0.00CVE-2021-27246
1730696.36.3
 
 
 
Alt-N MDaemon Remote Privilege Escalation0.08CVE-2021-27183
1730684.94.9
 
 
 
Alt-N MDaemon Worldclient injection0.00CVE-2021-27182
1730673.53.5
 
 
 
Alt-N MDaemon cross-site request forgery0.00CVE-2021-27181
1730663.53.5
 
 
 
Alt-N MDaemon Worldclient cross site scripting0.06CVE-2021-27180
1730653.73.7
 
 
 
Atlassian JIRA Server/Data Center Cookie missing secure attribute0.00CVE-2021-26076
1730644.34.3
 
 
 
Atlassian JIRA Server/Data Center Jira Importers Plugin information disclosure0.00CVE-2021-26075
1730635.55.5
 
 
 
Joomla! Module Layout Settings unknown vulnerability0.07CVE-2021-26031
1730623.53.5
 
 
 
Joomla! Error Page cross site scripting0.06CVE-2021-26030
1730613.53.5
 
 
 
Atlassian JIRA Server/Data Center Issue Navigation/Search View cross site scripting0.00CVE-2020-36288

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!