Exploit Prices 07/17/2021

Type

Not Defined11
Web Browser7
Reporting Software2
Backup Software1
Log Management Software1

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation

Official Fix15
Temporary Fix0
Workaround0
Unavailable0
Not Defined7

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High1
Functional0
Proof-of-Concept0
Unproven0
Not Defined21

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base

≤10
≤20
≤30
≤43
≤51
≤63
≤711
≤83
≤90
≤101

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤30
≤43
≤51
≤611
≤74
≤82
≤90
≤101

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k1
<2k4
<5k6
<10k2
<25k2
<50k0
<100k7
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k7
<2k5
<5k2
<10k1
<25k7
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTICVE
07/17/2021$25k-$100k$5k-$25kGoogle Chrome v8 use after freeNot Defined
 
 
0.04CVE-2021-30541
07/17/2021$25k-$100k$5k-$25kGoogle Chrome WebSerial use after freeNot Defined
 
 
0.05CVE-2021-30562
07/17/2021$25k-$100k$5k-$25kGoogle Chrome WebXR heap-based overflowNot Defined
 
 
0.05CVE-2021-30564
07/17/2021$25k-$100k$5k-$25kGoogle Chrome ANGLE out-of-bounds writeNot Defined
 
 
0.00CVE-2021-30559
07/17/2021$25k-$100k$5k-$25kGoogle Chrome Blink XSLT use after freeNot Defined
 
 
0.05CVE-2021-30560
07/17/2021$25k-$100k$5k-$25kGoogle Chrome v8 type confusionNot Defined
 
 
0.05CVE-2021-30561
07/17/2021$25k-$100k$5k-$25kGoogle Chrome v8 type confusionHigh
 
 
0.00CVE-2021-30563
07/17/2021$5k-$25k$5k-$25kDell EMC Avamar Server/Integrated Data Protection Appliance xml external entity referenceNot Defined
 
 
0.06CVE-2019-3752
07/17/2021$5k-$25k$0-$5kIBM InfoSphere Data Replication missing authenticationNot Defined
 
 
0.04CVE-2020-4821
07/17/2021$5k-$25k$0-$5kApple iMovie permissionNot Defined
 
 
0.04CVE-2021-30757
07/17/2021$5k-$25k$0-$5kIBM QRadar SIEM inadequate encryptionNot Defined
 
 
0.00CVE-2020-4980
07/17/2021$0-$5k$0-$5kIBM Infosphere Master Data Management Server cross-site request forgeryNot Defined
 
 
0.00CVE-2020-4675
07/17/2021$0-$5k$0-$5kLenovo ThinkPad System Shutdown SMI Callback input validationNot Defined
 
 
0.08CVE-2021-3452
07/17/2021$0-$5k$0-$5kTelegram App/Desktop Message Order unknown vulnerabilityNot Defined
 
 
0.00CVE-2021-36769
07/17/2021$0-$5k$0-$5kfail2ban mail-whois os command injectionNot Defined
 
 
0.05CVE-2021-32749
07/17/2021$0-$5k$0-$5kLenovo PCManager uncontrolled search pathNot Defined
 
 
0.00CVE-2021-3550
07/17/2021$0-$5k$0-$5kDr. ID Door Access Control and Personnel Attendance Management System hard-coded credentialsNot Defined
 
 
0.08CVE-2021-35961
07/17/2021$0-$5k$0-$5kCentreon Platform Centreon-Web sql injectionNot Defined
 
 
0.07CVE-2021-28053
07/17/2021$0-$5k$0-$5kDr. ID Door Access Control and Personnel Attendance Management System path traversalNot Defined
 
 
0.05CVE-2021-35962
07/17/2021$0-$5k$0-$5kLenovo Notebook/ThinkPad/Desktop BIOS Module protection mechanismNot Defined
 
 
0.05CVE-2021-3453
07/17/2021$0-$5k$0-$5kLenovo Notebook BIOS Update Local Privilege EscalationNot Defined
 
 
0.04CVE-2021-3614
07/17/2021$0-$5k$0-$5kMicronaut path traversalNot Defined
 
 
0.04CVE-2021-32769

Do you want to use VulDB in your project?

Use the official API to access entries easily!