CVSSv3 05/23/2022

CVSSv3 Base

≤10
≤20
≤32
≤45
≤58
≤66
≤71
≤80
≤92
≤100

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤32
≤45
≤58
≤66
≤71
≤81
≤91
≤100

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤20
≤33
≤412
≤50
≤66
≤72
≤81
≤90
≤100

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤30
≤40
≤52
≤61
≤74
≤80
≤90
≤101

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤42
≤51
≤62
≤71
≤80
≤90
≤101

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

IDBaseVDBNVDCNAVendResVulnerabilityCTICVE
2005815.55.5
 
 
 
 
CSZCMS server-side request forgery0.65CVE-2022-28997
2005805.13.5
 
6.8
 
 
DivvyDrive cross site scripting0.65CVE-2022-0900
2005798.16.3
 
9.9
 
 
publify access control0.53CVE-2022-1810
2005785.55.5
 
 
 
 
Xlight FTP stack-based overflow0.47CVE-2022-28998
2005774.83.55.45.5
 
 
collectiveaccess providence cross site scripting0.59CVE-2022-1825
2005765.55.5
 
 
 
 
LibreDWG dwg File decode_r2007.c copy_bytes heap-based overflow0.53CVE-2021-42586
2005755.55.5
 
 
 
 
LibreDWG dwg File decode_r2007.c copy_compressed_bytes heap-based overflow0.47CVE-2021-42585
2005744.85.3
 
4.3
 
 
F-Secure Endpoint Protection PE32-Bit File heap-based overflow0.65CVE-2022-28874
2005735.55.5
 
 
 
 
Apache maven-shared-utils Quoted String Commandline command injection0.48CVE-2022-29599
2005724.23.1
 
5.3
 
 
JFrog Artifactory Copy access control0.73CVE-2021-41834
2005712.42.4
 
 
 
 
Curtain Plugin cross site scripting0.36CVE-2022-1558
2005703.53.5
 
 
 
 
Check & Log Email Plugin Admin Page cross site scripting0.37CVE-2022-1547
2005692.42.4
 
 
 
 
Sliderby10Web Plugin Setting cross site scripting0.49CVE-2022-1320
2005684.13.54.8
 
 
 
Tabs Plugin Tab Description cross site scripting0.36CVE-2022-1298
2005674.83.56.1
 
 
 
Donate Extra Plugin cross site scripting0.36CVE-2022-1268
2005664.83.56.1
 
 
 
Gwyn's Imagemap Selector Plugin Attribute cross site scripting0.71CVE-2022-1221
2005654.83.56.1
 
 
 
Domain Replace Plugin Admin Page cross site scripting0.60CVE-2022-1218
2005644.83.56.1
 
 
 
Turn Off All Comments Plugin Admin Page cross site scripting0.68CVE-2022-1192
2005633.62.44.8
 
 
 
WP Meta SEO Plugin Breadcrumb Separator cross site scripting0.54CVE-2022-1093
2005626.36.3
 
 
 
 
WP Contacts Manager Plugin sql injection0.68CVE-2022-1014
2005618.57.39.8
 
 
 
Nirweb Support Plugin sql injection0.54CVE-2022-0781
2005603.53.5
 
 
 
 
XML Sitemap Generator for Google Plugin Error Message cross site scripting0.48CVE-2022-0346
2005593.53.5
 
3.5
 
 
Badminton Center Management System Userlist Module cross site scripting1.02CVE-2022-1817
2005583.53.5
 
3.5
 
 
Zoo Management System Content Module cross site scripting1.19CVE-2022-1816

Want to stay up to date on a daily basis?

Enable the mail alert feature now!