CVSSv3 12/22/2021

CVSSv3 Base

≤10
≤20
≤31
≤423
≤59
≤636
≤719
≤83
≤90
≤100

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤31
≤424
≤58
≤638
≤719
≤81
≤90
≤100

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤20
≤31
≤424
≤515
≤631
≤718
≤82
≤90
≤100

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤81
≤91
≤100

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤40
≤52
≤60
≤73
≤85
≤91
≤100

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDCNAVendResVulnerabilityCTICVE
1889585.94.3
 
7.5
 
 
Delta Electronics DIAEnergie Parameter HandlerEnergyType.ashx cross site scripting0.00CVE-2021-44544
1889575.94.3
 
7.5
 
 
Delta Electronics DIAEnergie Parameter DIAE_HandlerAlarmGroup.ashx cross site scripting0.04CVE-2021-44471
1889565.44.3
 
6.5
 
 
Delta Electronics DIAEnergie Parameter DIAE_hierarchyHandler.ashx cross site scripting0.04CVE-2021-31558
1889555.94.3
 
7.5
 
 
Delta Electronics DIAEnergie Error Page cross site scripting0.00CVE-2021-23228
1889545.55.5
 
 
 
 
Garrett Metal Detectors iC Module CMA Command Line Argument getenv pathname traversal0.00CVE-2021-21907
1889535.55.5
 
 
 
 
Lantronix PremierWave Web Manager FsMove pathname traversal0.00CVE-2021-21885
1889525.55.5
 
 
 
 
Lantronix PremierWave Web Manager FsCopyFile pathname traversal0.03CVE-2021-21880
1889514.14.1
 
 
 
 
Lantronix PremierWave Web Manager file inclusion0.00CVE-2021-21878
1889505.05.0
 
 
 
 
Anker Eufy Homebase home_security process_msg channel accessible0.06CVE-2021-21953
1889496.36.3
 
 
 
 
Anker Eufy Homebase Network Packet CMD_DEVICE_GET_RSA_KEY_REQUEST improper authentication0.03CVE-2021-21952
1889485.55.5
 
 
 
 
Garrett Metal Detectors iC Module CMA Command Line Privilege Escalation0.04CVE-2021-21909
1889475.55.5
 
 
 
 
Garrett Metal Detectors iC Module CMA Service Port 6877 readfile stack-based overflow0.00CVE-2021-21905
1889465.55.5
 
 
 
 
Garrett Metal Detectors iC Module CMA CLI pathname traversal0.03CVE-2021-21904
1889455.55.5
 
 
 
 
Garrett Metal Detectors iC Module CMA check_udp_crc stack-based overflow0.00CVE-2021-21903
1889446.36.3
 
 
 
 
Garrett Metal Detectors iC Module CMA Network Connection run_server_6877 improper authentication0.04CVE-2021-21902
1889435.55.5
 
 
 
 
Garrett Metal Detectors iC Module CMA check_udp_crc stack-based overflow0.00CVE-2021-21901
1889424.64.6
 
 
 
 
Lantronix PremierWave Web Manager pathname traversal0.03CVE-2021-21896
1889414.64.6
 
 
 
 
Lantronix PremierWave Web Manager pathname traversal0.03CVE-2021-21895
1889405.55.5
 
 
 
 
Lantronix PremierWave Web Manager os command injection0.04CVE-2021-21888
1889395.55.5
 
 
 
 
Lantronix PremierWave Web Manager os command injection0.00CVE-2021-21884
1889385.55.5
 
 
 
 
Lantronix PremierWave Web Manager os command injection0.07CVE-2021-21883
1889375.55.5
 
 
 
 
Lantronix PremierWave Web Manager os command injection0.03CVE-2021-21882
1889365.55.5
 
 
 
 
Lantronix PremierWave Web Manager os command injection0.04CVE-2021-21881
1889355.55.5
 
 
 
 
Lantronix PremierWave Web Manager pathname traversal0.03CVE-2021-21879
1889345.55.5
 
 
 
 
Lantronix PremierWave Web Manager Privilege Escalation0.00CVE-2021-21877
1889335.55.5
 
 
 
 
Lantronix PremierWave Web Manager Privilege Escalation0.00CVE-2021-21876
1889325.55.5
 
 
 
 
Lantronix PremierWave Web Manager Privilege Escalation0.03CVE-2021-21875
1889315.55.5
 
 
 
 
Lantronix PremierWave Web Manager Privilege Escalation0.00CVE-2021-21874
1889305.55.5
 
 
 
 
Lantronix PremierWave Web Manager Privilege Escalation0.03CVE-2021-21873
1889295.55.5
 
 
 
 
Lantronix PremierWave Web Manager os command injection0.00CVE-2021-21872
1889285.55.5
 
 
 
 
Realtek RTL8195AM WEP stack-based overflow0.05CVE-2021-39306
1889274.64.6
 
 
 
 
Garrett Metal Detectors iC Module CMA Command Line handle_delete pathname traversal0.05CVE-2021-21908
1889265.55.5
 
 
 
 
Garrett Metal Detectors iC Module CMA Service Port 6877 checkPassword stack-based overflow0.04CVE-2021-21906
1889253.53.5
 
 
 
 
Lantronix PremierWave Web Manager pathname traversal0.03CVE-2021-21894
1889243.53.5
 
 
 
 
Lantronix PremierWave Web Manager pathname traversal0.00CVE-2021-21886
1889235.55.5
 
 
 
 
Blackmagic Design DaVinci Resolve DPDecoder Service uninitialized pointer0.04CVE-2021-40418
1889225.55.5
 
 
 
 
Blackmagic Design DaVinci Resolve DPDecoder Service heap-based overflow0.04CVE-2021-40417
1889216.36.3
 
 
 
 
Gerbv RS-274X Aperture Macro Variable out-of-bounds write0.04CVE-2021-40394
1889206.36.3
 
 
 
 
Gerbv RS-274X Aperture Macro Variable out-of-bounds write0.00CVE-2021-40393
1889196.36.3
 
 
 
 
Lantronix PremierWave Web Manager stack-based overflow0.06CVE-2021-21892

51 more entries are not shown

Do you know our Splunk app?

Download it now for free!