Archive January 2022

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product

Microsoft Windows95
Reolink RLC-410W79
Bentley View74
GPAC46
Google Chrome46

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix1205
Temporary Fix1
Workaround24
Unavailable0
Not Defined799

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High1
Functional2
Proof-of-Concept95
Unproven90
Not Defined1841

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

CVSSv3 Base

≤10
≤24
≤334
≤4511
≤5300
≤6397
≤7430
≤8253
≤992
≤108

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤26
≤345
≤4510
≤5306
≤6566
≤7305
≤8226
≤960
≤105

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k593
<2k362
<5k550
<10k129
<25k167
<50k77
<100k118
≥100k33

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k1199
<2k332
<5k189
<10k101
<25k149
<50k59
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

PublishedBaseTempVulnerability0dayTodayExpRemCTICVE
01/31/20227.77.7PrinterLogic Web Stack hard-coded key$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2021-42635
01/31/20227.77.7PrinterLogic Web Stack deserialization$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2021-42631
01/31/20223.53.4SourceCodester Stock Management System in PHP OOP Create User cross site scripting$0-$5k$0-$5kNot DefinedNot Defined0.07CVE-2021-44114
01/31/20223.53.5Huawei CloudEngine 7800 memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2021-40042
01/31/20223.53.5Huawei CloudEngine 7800 information disclosure$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2021-40033
01/31/20226.36.3Stormshield Network Security ASQ memory corruption$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2021-31617
01/31/20223.53.4Linux Kernel bond_ipsec_add_sa null pointer dereference$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-0286
01/31/20226.36.1Victor CMS POST Request sql injection$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2021-46458
01/31/20226.35.7Git Pull git.cmd access control$0-$5k$0-$5kProof-of-ConceptNot Defined0.07CVE-2021-46101
01/31/20224.34.1Stormshield Network Security CLI Command access control$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2021-28962
01/31/20223.53.4Beetel 777VR1-DI Ping Diagnostic cross site scripting$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2020-36056
01/31/20227.37.1SourceCodester Online Course Registration Control Panel hard-coded credentials$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2020-36064
01/31/20223.43.3Dolibarr unknown vulnerability$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2022-0414
01/31/20224.44.3juce juce_ZipFile.cpp uncompressEntry symlink$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2021-23521
01/31/20224.74.6juce Archive Extraction juce_ZipFile.cpp uncompressEntry unknown vulnerability$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2021-23520
01/31/20226.36.3MotionEye/MotioneEyeOS Configuration Backup unrestricted upload$0-$5k$0-$5kNot DefinedNot Defined0.05CVE-2021-44255
01/31/20226.36.0strongSwan Mutual Authentication improper authentication$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2021-45079
01/31/20225.55.3Land FAUST iServer URL Request path traversal$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2021-34805
01/31/20226.36.1ALPS Alpine TouchPad Driver injection$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2021-27971
01/31/20224.34.1Logs Plugin Controller.php actionStream information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2022-23409
01/31/20225.55.2xterm Sixel Support graphics_sixel.c set_sixel buffer overflow$0-$5k$0-$5kProof-of-ConceptNot Defined0.04CVE-2022-24130
01/30/20227.37.2vim use after free$0-$5k$0-$5kNot DefinedOfficial Fix0.06CVE-2022-0413
01/30/20227.37.2vim stack-based overflow$0-$5k$0-$5kNot DefinedOfficial Fix0.07CVE-2022-0408
01/30/20226.96.8Calibre-web server-side request forgery$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2022-0339
01/30/20226.05.9vim heap-based overflow$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2022-0407
01/30/20225.35.2Calibre-web access control$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-0273
01/30/20223.13.0Adenza AxiomSL ControllerView Login information exposure$0-$5k$0-$5kNot DefinedNot Defined0.07CVE-2022-24032
01/30/20225.55.3Adenza AxiomSL ControllerView SSO Login URL redirect$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2022-22919
01/30/20225.55.3Signiant Manager+Agents xml external entity reference$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2021-46660
01/30/20224.34.1MariaDB View nest_level denial of service$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2021-46659
01/30/20226.36.0Casdoor Query API sql injection$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2022-24124
01/30/20225.35.1MariaDB Subquery save_window_function_values denial of service$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2021-46658
01/30/20225.35.1MariaDB ORDER BY Query get_sort_by_table denial of service$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2021-46657
01/30/20223.53.4MarkText Mermaid Block cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.07CVE-2022-24123
01/30/20228.88.4Linux Kernel User Namespace ucount.c use after free$25k-$100k$5k-$25kNot DefinedOfficial Fix0.00CVE-2022-24122
01/29/20227.37.0GE Gas Power ToolBoxST Template File xml external entity reference$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2021-44477
01/29/20227.57.2Fernhill SCADA Server FHSvrService.exe resource consumption$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2022-21155
01/29/20227.36.4Backdoor.Win32.Tiny.c Service Port 7778 backdoor$0-$5k$0-$5kProof-of-ConceptWorkaround0.04
01/29/20226.35.7HackTool.Win32.Muzzer.a File heap-based overflow$0-$5k$0-$5kProof-of-ConceptNot Defined0.07
01/29/20227.37.1bmoor Incomplete Fix CVE-2020-7736 code injection$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2021-23558
01/29/20224.44.4livehelperchat cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2022-0395
01/29/20226.05.9calibreweb cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-0352
01/29/20223.53.4H.H.G. Multistore Address Book cross site scripting$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2021-46447
01/29/20224.34.3YzmCMS delete cross-site request forgery$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2022-23887
01/29/20223.53.4Reolink RLC-410W JSON Command Parser cgiserver.cgi denial of service$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2021-44372
01/29/20228.58.4zip-local Archive Extraction access control$0-$5k$0-$5kNot DefinedOfficial Fix0.12CVE-2021-23484
01/29/20223.53.5Gibbon CMS cross site scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-22868
01/29/20225.05.0Synel eharmony cross site scripting$0-$5k$0-$5kNot DefinedNot Defined0.08CVE-2022-22791
01/29/20225.55.3Reolink RLC-410W SetLocalLink API os command injection$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2021-40411
01/29/20225.55.3Reolink RLC-410W SetLocal API os command injection$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2021-40410

1979 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!