Archive 10/11/2019

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product »

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

IDBaseTempVulnerability0dayTodayExpRemCVE
1434216.46.4Samsung Laser Printers denial of service$0-$5k$0-$5kNot DefinedNot DefinedCVE-2019-6335
1434206.05.7HP Touchpoint Analytics System Service privilege escalation$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2019-6333
1434194.44.2Google Android nfc_ncif.cc nfc_ncif_decode_rf_params information disclosure$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2019-2187
1434187.57.2Google Android combined_decode.cpp GetMBheader memory corruption$25k-$100k$5k-$25kNot DefinedOfficial FixCVE-2019-2186
1434177.57.2Google Android vlc_dequant.cpp VlcDequantH263IntraBlock_SH memory corruption$25k-$100k$5k-$25kNot DefinedOfficial FixCVE-2019-2185
1434167.57.2Google Android dec_pred_intra_dc.cpp PV_DecodePredictedIntraDC memory corruption$25k-$100k$5k-$25kNot DefinedOfficial FixCVE-2019-2184
1434154.44.2Google Android Cache RegisteredServicesCache.java generateServicesMap information disclosure$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2019-2183
1434146.56.3Google Android Permission Check ActivityStarter.java startActivityMayWait privilege escalation$25k-$100k$5k-$25kNot DefinedOfficial FixCVE-2019-2173
1434136.56.3Google Android NFC privilege escalation$25k-$100k$5k-$25kNot DefinedOfficial FixCVE-2019-2114
1434124.44.2Google Android Permission Check ScreenRotationAnimation.java ScreenRotationAnimation information disclosure$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2019-2110
1434109.89.8D-Link DIR-846 SetWizardConfig.php SetWizardConfig privilege escalation$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-17510
1434099.89.8D-Link DIR-846 SetMasterWLanSettings.php SetMasterWLanSettings privilege escalation$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-17509
1434088.58.5D-Link DIR-850/DIR-859 DEVICE.TIME.php command injection$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-17508
1434077.47.4D-Link DIR-816 A1 Management Page privilege escalation$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-17507
1434067.57.5D-Link DIR-868L/DIR-817LW Web Interface getcfg.php information disclosure$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-17506
1434057.47.2D-Link DAP-1320 Web Interface weak authentication$5k-$25k$5k-$25kNot DefinedWorkaroundCVE-2019-17505
1434045.75.4Kirona Dynamic Resource Scheduling cross site scripting$0-$5k$0-$5kProof-of-ConceptNot DefinedCVE-2019-17504
1434035.35.0Kirona Dynamic Resource Scheduling REGISTER.cmd information disclosure$0-$5k$0-$5kProof-of-ConceptNot DefinedCVE-2019-17503
1434028.88.8Compal CH7465LG Common Gateway Interface setter.xml command injection$0-$5k$0-$5kNot DefinedNot DefinedCVE-2019-17499
1434015.25.2Genesys PureEngage Digital HtmlChatPanel.jsp cross site scripting$0-$5k$0-$5kNot DefinedNot DefinedCVE-2019-17176
1434008.58.2Sophos Cyberoam Firewall SSL VPN Console Shell privilege escalation$0-$5k$0-$5kNot DefinedOfficial FixCVE-2019-17059
1433996.56.5Intel NUC System Firmware memory corruption$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-14570
1433986.56.5Intel NUC System Firmware Pointer memory corruption$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-14569
1433977.47.4Kaseya VSA RMM LAN Cache weak authentication$0-$5k$0-$5kNot DefinedNot DefinedCVE-2019-14510
1433966.56.5Intel Smart Connect Technology for Intel NUC File Permission privilege escalation$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-11167
1433956.56.3Intel Active System Console Installer privilege escalation$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2019-11120
1433946.45.9Boa free denial of service$0-$5k$0-$5kNot DefinedNot DefinedCVE-2018-21028
1433938.57.9Boa Out-of-Bounds memory corruption$0-$5k$0-$5kNot DefinedNot DefinedCVE-2018-21027
1433926.56.5GREE+ cross site request forgery$0-$5k$0-$5kNot DefinedNot DefinedCVE-2018-20582
1433917.47.4Graphite views.py send_email Server-Side Request Forgery$0-$5k$0-$5kNot DefinedNot DefinedCVE-2017-18638
1433906.46.4ThemeMakers SmartIT Premium Responsive Theme wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9492
1433894.34.3ThemeMakers Blessing Premium Responsive Theme wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9491
1433886.46.4ThemeMakers GamesTheme Premium Theme wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9490
1433874.34.3ThemeMakers Goodnex Premium Responsive Theme wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9489
1433866.46.4wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9488
1433856.46.4ThemeMakers Almera Responsive Portfolio Theme wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9487
1433846.46.4ThemeMakers Axioma Premium Responsive Theme wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9486
1433836.46.4wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9485
1433824.34.3wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9484
1433814.34.3ThemeMakers Invento Responsive Gallery wp_users.dat information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2015-9483

Do you need the next level of professionalism?

Upgrade your account now!