CVSSv3 09/13/2021info

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDCNAVendResVulnerabilityCTICVE
1825316.36.3
 
 
 
 
Apple iOS/iPadOS WebKit use after free2.74CVE-2021-30858
1825307.06.37.8
 
 
 
Apple iOS/iPadOS CoreGraphics FORCEDENTRY integer overflow4.64CVE-2021-30860
1825106.36.3
 
 
 
 
Delta Electronics DOPSoft Project File Parser heap-based overflow0.35CVE-2021-38404
1825096.36.3
 
 
 
 
Delta Electronics DOPSoft Project File Parser out-of-bounds write0.32CVE-2021-38406
1825086.36.3
 
 
 
 
Delta Electronics DOPSoft Project File Parser stack-based overflow0.53CVE-2021-38402
1825073.53.5
 
 
 
 
PRTG Network Monitor Active Directory cross site scripting0.41CVE-2021-29643
1825066.36.3
 
 
 
 
GPAC MP4Box URL_GetProtocolType heap-based overflow0.41CVE-2021-32137
1825054.34.3
 
 
 
 
GPAC MP4Box Command trak_box_size null pointer dereference0.38CVE-2021-32135
1825044.34.3
 
 
 
 
GPAC MP4Box Command gf_odf_desc_copy null pointer dereference0.35CVE-2021-32134
1825034.34.3
 
 
 
 
GPAC MP4Box Command abst_box_size null pointer dereference0.44CVE-2021-32132
1825026.36.3
 
 
 
 
Nitro Pro PDF PDF File use after free0.50CVE-2021-21798
1825015.73.5
 
8.0
 
 
Microfocus NetIQ Access Manager cross site scripting0.35CVE-2021-22528
1825003.53.5
 
 
 
 
Gibbon Wall Message cross site scripting0.35CVE-2021-40214
1824996.36.3
 
 
 
 
GPAC print_udta heap-based overflow0.32CVE-2021-32136
1824984.02.0
 
6.0
 
 
Microfocus NetIQ Access Manager information disclosure0.47CVE-2021-22527
1824974.74.6
 
4.9
 
 
Microfocus NetIQ Access Manager redirect0.32CVE-2021-22526
1824964.84.2
 
5.4
 
 
Microfocus NetIQ Access Manager injection0.38CVE-2021-22524
1824956.36.3
 
 
 
 
Yandex Browser Remote Code Execution0.32CVE-2020-27969
1824944.34.3
 
 
 
 
Yandex Browser Address Bar unknown vulnerability0.20CVE-2020-27970
1824936.36.3
 
 
 
 
Aviatrix Controller pathname traversal0.29CVE-2021-40870
1824928.08.1
 
7.8
 
 
Netgear GC108P HTTP Authentication improper authentication0.32CVE-2021-40867
1824916.73.7
 
9.8
 
 
Netgear GC108P NSDP Packet sccd improper authentication0.28CVE-2021-40866
1824906.96.3
 
7.6
 
 
clearance Session redirect0.23CVE-2021-23435

Want to stay up to date on a daily basis?

Enable the mail alert feature now!