Archive 05/04/2020

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product »

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

1547393.93.9Google Earth Pro khcrypt memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.00CVE-2020-8896
1547385.35.3OKLOK Mobile Companion App information disclosure$0-$5k$0-$5kNot DefinedNot Defined0.07CVE-2020-8792
1547376.46.4OKLOK Mobile Companion App API information disclosure$0-$5k$0-$5kNot DefinedNot Defined0.08CVE-2020-8791
1547366.76.7OKLOK Mobile Companion App Password Requirements weak password$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2020-8790
1547357.37.3Dell Client Platform OS Recovery Image misconfiguration$5k-$25k$5k-$25kNot DefinedNot Defined0.00CVE-2020-5343
1547345.55.2RSA Archer redirect$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-5337
1547334.44.2RSA Archer cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-5336
1547325.45.2RSA Archer cross-site request forgery$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-5335
1547316.46.1RSA Archer DOM-Based cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-5334
1547305.35.1RSA Archer REST API improper authorization$5k-$25k$0-$5kNot DefinedOfficial Fix0.04CVE-2020-5333
1547295.95.7RSA Archer os command injection$5k-$25k$0-$5kNot DefinedOfficial Fix0.05CVE-2020-5332
1547286.05.8RSA Archer Cache/Log File information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-5331
1547275.95.9IBM Spectrum Protect Plus path traversal$5k-$25k$5k-$25kNot DefinedNot Defined0.00CVE-2020-4209
1547264.64.4Soteria access control$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-1732
1547247.46.5service-api XML Data xml external entity reference$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-12642
1547238.58.2RoundCube Webmail Config Setting rcube_image.php argument injection$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2020-12641
1547228.58.2RoundCube Webmail rcube_plugin_api.php path traversal$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2020-12640
1547215.24.9PHPList template.php cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.08CVE-2020-12639
1547205.45.4TP-LINK Omada Controller Software eap-web-3.2.6.jar path traversal$0-$5k$0-$5kNot DefinedNot Defined0.06CVE-2020-12475
1547197.57.5TP-LINK NC260/NC450 os command injection$0-$5k$0-$5kNot DefinedNot Defined0.06CVE-2020-12111
1547188.58.5TP-LINK NC200/NC210/NC220/NC230/NC250/NC260/NC450 hard-coded credentials$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2020-12110
1547177.57.5TP-LINK NC200/NC210/NC220/NC230/NC250/NC260/NC450 os command injection$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2020-12109
1547167.27.2TeamPass REST API privileges management$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2020-11671
1547156.46.1OpenVPN Access Server Management Interface xml entity expansion$0-$5k$0-$5kNot DefinedOfficial Fix0.10CVE-2020-11462
1547146.76.4Zoom MSI Installer permission assignment$5k-$25k$0-$5kNot DefinedOfficial Fix0.11CVE-2020-11443
1547137.47.4Ruby heap-based buffer overflow$0-$5k$0-$5kNot DefinedNot Defined1.38CVE-2020-10933
1547126.56.5OKLOK Mobile Companion App Email Verification excessive authentication$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2020-10876
1547113.33.3QEMU virtiofsd resource consumption$0-$5k$0-$5kNot DefinedNot Defined1.53CVE-2020-10717
1547104.24.0Samba AD DC LDAP Server use after free$0-$5k$0-$5kNot DefinedOfficial Fix0.08CVE-2020-10700
1547093.13.0KeyCloak improper authorization$0-$5k$0-$5kNot DefinedOfficial Fix1.48CVE-2020-10686
1547086.56.5LCDS LAquis SCADA input validation$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2020-10622
1547074.44.4LCDS LAquis SCADA information disclosure$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2020-10618
1547066.46.4Doorkeeper authorized_applications.json information disclosure$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2020-10187
1547057.47.4CoSoSys Endpoint Protector Header Injection injection$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2019-13285
1547044.44.4Solarwinds Orion Platform Error information disclosure$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2019-12864
1547036.46.1TensorFlow BMP Decoder DecodeBmp out-of-bounds read$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2018-21233
1547028.18.1SuSE Linux Enterprise Server 15 etc default permission$5k-$25k$5k-$25kNot DefinedNot Defined1.93CVE-2020-8018
1547018.58.2Apache Syncope Template injection$5k-$25k$0-$5kNot DefinedOfficial Fix0.05CVE-2020-1961
1547008.58.2Apache Syncope Template code injection$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-1959
1546996.36.1Juniper Junos HTTP Service file inclusion$5k-$25k$0-$5kNot DefinedOfficial Fix0.04CVE-2020-1631
1546984.44.3osTicket SLA Name class.sla.php cross site scripting$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.04CVE-2020-12629
1546974.03.8Linux Kernel Reference Counter namespace.c pivot_root race condition$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2020-12114
1546966.46.1Micro Focus Verastream Host Integrator information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-11842
1546954.44.4Apache Syncope EndUser UI Login Page cross site scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2019-17557
1546946.96.6Synology Router Manager Network Center crlf injection$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2019-11823
1546938.58.5Calibre-Web improper authentication$0-$5k$0-$5kNot DefinedNot Defined0.10CVE-2020-12627
1546925.04.8RoundCube Webmail cross-site request forgery$0-$5k$0-$5kNot DefinedOfficial Fix0.06CVE-2020-12626
1546915.24.9RoundCube Webmail rcube_washtml.php cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-12625

Interested in the pricing of exploits?

See the underground prices here!