Archive 03/04/2020

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product »

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

1508878.58.5UNCTAD ASYCUDA World Java RMI Server Remote Code Execution$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-9761
1508866.46.1Craft CMS Seomatic Injection privilege escalation$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-9757
1508858.08.0Rubetek SmartHome Beacon Sniffing weak encryption$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-9550
1508848.58.5Humax HGA12R-02 BRGCAA Web-based Interface weak authentication$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-9477
1508836.46.4Arris TG1692A Login Page login Credentials information disclosure$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-9476
1508826.56.3Appointment Booking Calendar Plugin CSV Injection privilege escalation$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-9372
1508814.13.9Appointment Booking Calendar Plugin cpabc_appointments.php Stored cross site scripting$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-9371
1508805.35.1Creative Contact Form Extension mailer.php information disclosure$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-9364
1508798.58.2ZyXEL NAS weblogin.cgi command injection$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-9054
1508788.58.5CNCF Envoy Access Control privilege escalation$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-8664
1508776.46.4CNCF Envoy Pipeline Memory Exhaustion denial of service$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-8661
1508768.58.5CNCF Envoy TLS Inspector privilege escalation$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-8660
1508756.46.4CNCF Envoy Proxy Memory Exhaustion denial of service$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-8659
1508746.56.5phpipam result.php cross site request forgery$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-7988
1508736.46.1HPE OneView Global Dashboard information disclosure$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-7130
1508725.34.7parser-server Regex information disclosure$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-5251
1508715.35.1Cisco Prime Collaboration Provisioning Web-based Management Interface information disclosure$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3193
1508705.75.4Cisco Prime Collaboration Provisioning Web-based Management Interface cross site scripting$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3192
1508695.55.3Cisco IOS XR IPsec Packet Processor denial of service$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3190
1508684.54.3Cisco TelePresence Management Suite Web-based Management Interface cross site scripting$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3185
1508674.34.1Cisco Webex Meetings Client mDNS information disclosure$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3182
1508665.95.6Cisco Cisco Email Security Appliance Advanced Malware Protection Resource Exhaustion denial of service$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3181
1508657.37.0Cisco Remote PHY Device Software Linux Shell privilege escalation$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3176
1508645.35.1Cisco Email Security Appliance Web-based Management Interface CPU Exhaustion denial of service$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3164
1508635.45.2Cisco Identity Services Engine Web-based Management Interface cross site scripting$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3157
1508626.56.2Cisco Intelligent Proximity SSL Man-in-the-Middle weak authentication$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3155
1508617.77.3Coscp Prime Network Registrar Web-based Interface cross site request forgery$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-3148
1508607.06.7Cisco WebEx Network Recording Player/Webex Player privilege escalation$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3128
1508597.06.7Cisco WebEx Network Recording Player/Webex Player privilege escalation$5k-$25k$0-$5kNot DefinedOfficial FixCVE-2020-3127
1508486.56.5GeniXCMS Incomplete Fix cross site request forgery$0-$5k$0-$5kNot DefinedNot DefinedCVE-2020-10057
1508475.45.2GNU C Library Double Function e_rem_pio2l.c Stack-based memory corruption$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-10029
1508467.47.4D-Link DSL-2680 Web Administration Interface WlanMacFilter_1 privilege escalation$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-19226
1508457.47.4D-Link DSL-2680 Web Administration Interface dns_1 privilege escalation$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-19225
1508446.46.4D-Link DSL-2680 Web Administration Interface Config information disclosure$5k-$25k$5k-$25kNot DefinedNot DefinedCVE-2019-19224
1508436.46.4D-Link DSL-2680 Web Administration Interface reboot.html Reboot denial of service$5k-$25k$0-$5kNot DefinedNot DefinedCVE-2019-19223
1508424.44.4D-Link DSL-2680 Web Administration Interface info.html Stored cross site scripting$0-$5k$0-$5kNot DefinedNot DefinedCVE-2019-19222
1508416.46.1Centreon refreshMacroAjax.php information disclosure$0-$5k$0-$5kNot DefinedOfficial FixCVE-2019-17644
1508406.46.1Centreon GetXMLHost4Services.php information disclosure$0-$5k$0-$5kNot DefinedOfficial FixCVE-2019-17643
1508397.47.4360 Router P0/Router F5C uri ofrouter App privilege escalation$0-$5k$0-$5kNot DefinedNot DefinedCVE-2019-3404
1508377.57.2OpenBlocks IoT VX2 weak authentication$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-5536
1508368.88.4OpenBlocks IoT VX2 OS Command Injection privilege escalation$0-$5k$0-$5kNot DefinedOfficial FixCVE-2020-5535

Do you need the next level of professionalism?

Upgrade your account now!