Exploit Prices 05/06/2022

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation

Official Fix65
Temporary Fix0
Workaround0
Unavailable0
Not Defined47

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High0
Functional0
Proof-of-Concept7
Unproven0
Not Defined105

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang

Python1
HTTP POST Request1

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base

≤10
≤20
≤30
≤412
≤513
≤639
≤730
≤810
≤96
≤102

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤30
≤412
≤513
≤644
≤729
≤810
≤92
≤102

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k15
<2k40
<5k32
<10k11
<25k14
<50k0
<100k0
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k50
<2k44
<5k15
<10k3
<25k0
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTICVE
05/06/2022$5k-$25k$5k-$25kF5 BIG-IP Advanced WAF Appliance Mode Restrictions improper validation of integrity check valueNot Defined
 
 
0.06CVE-2022-25946
05/06/2022$5k-$25k$5k-$25kF5 BIG-IP APM/BIG-IP APM Client Windows Installer uncontrolled search pathNot Defined
 
 
0.06CVE-2022-28714
05/06/2022$5k-$25k$5k-$25kF5 BIG-IP Traffic Management Microkernel integer overflowNot Defined
 
 
0.03CVE-2022-28705
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Advanced WAF Appliance Mode Restrictions command injectionNot Defined
 
 
0.06CVE-2022-27806
05/06/2022$5k-$25k$0-$5kF5 BIG-IP AFM File unrestricted uploadNot Defined
 
 
0.00CVE-2022-28695
05/06/2022$5k-$25k$0-$5kF5 BIG-IP iControl REST Endpoint command injectionNot Defined
 
 
0.03CVE-2022-26415
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Advanced WAF/BIG-IP ASM/BIG-IP APM Session ID control flowNot Defined
 
 
0.00CVE-2022-26890
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Active Mode-Enabled FTP unusual conditionNot Defined
 
 
0.05CVE-2022-26130
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Traffic Management Microkernel unusual conditionNot Defined
 
 
0.03CVE-2022-29473
05/06/2022$5k-$25k$0-$5kF5 BIG-IP APM/BIG-IP APM Client Client Component Installer Service permission assignmentNot Defined
 
 
0.00CVE-2022-29263
05/06/2022$5k-$25k$0-$5kF5 BIG-IP iControl REST Authentication bash missing authenticationProof-of-ConceptPythonLink0.17CVE-2022-1388
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Traffic Management User Interface privileges managementNot Defined
 
 
0.05CVE-2022-27659
05/06/2022$5k-$25k$0-$5kF5 BIG-IP APM Policy access controlNot Defined
 
 
0.04CVE-2022-27634
05/06/2022$5k-$25k$0-$5kF5 BIG-IP/BIG-IQ Centralized Management Certificate permission assignmentNot Defined
 
 
0.03CVE-2022-26340
05/06/2022$5k-$25k$0-$5kF5 BIG-IP iControl SOAP path traversalNot Defined
 
 
0.03CVE-2022-29474
05/06/2022$5k-$25k$0-$5kF5 BIG-IP APM/BIG-IP APM Client VPN log fileNot Defined
 
 
0.04CVE-2022-27636
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Net HSM nethsm-safenet-install.sh log fileNot Defined
 
 
0.03CVE-2022-28859
05/06/2022$5k-$25k$0-$5kIBM Robotic Process Automation Control Center information disclosureNot Defined
 
 
0.05CVE-2022-22415
05/06/2022$5k-$25k$0-$5kF5 BIG-IP LTM HTTP null pointer dereferenceProof-of-ConceptHTTP POST RequestLink0.09CVE-2022-29491
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Configuration utility cross-site request forgeryNot Defined
 
 
0.00CVE-2022-1389
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Stream Profile resource consumptionNot Defined
 
 
0.00CVE-2022-28701
05/06/2022$5k-$25k$0-$5kF5 BIG-IP/BIG-IQ Centralized Management IPv6 Address denial of serviceNot Defined
 
 
0.03CVE-2022-29479
05/06/2022$5k-$25k$0-$5kMozilla Hawk HTTP Authentication resource consumptionNot Defined
 
 
0.00CVE-2022-29167
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Traffic Management Microkernel denial of serviceNot Defined
 
 
0.00CVE-2022-28708
05/06/2022$5k-$25k$0-$5kF5 BIG-IP Route Domain resource consumptionNot Defined
 
 
0.03CVE-2022-29480
05/06/2022$0-$5k$0-$5kF5 BIG-IP AFM/BIG-IP CGNAT/BIG-IP PEM Configuration Utility cross site scriptingNot Defined
 
 
0.03CVE-2022-28716
05/06/2022$0-$5k$0-$5kF5 Traffix SDC Template Language injectionNot Defined
 
 
0.00CVE-2022-27662
05/06/2022$0-$5k$0-$5kF5 BIG-IP/BIG-IP Guided Configuration cross site scriptingNot Defined
 
 
0.03CVE-2022-27878
05/06/2022$0-$5k$0-$5kF5 BIG-IP APM/BIG-IP Guided Configuration cross site scriptingNot Defined
 
 
0.03CVE-2022-27230
05/06/2022$0-$5k$0-$5kF5 BIG-IP Configuration Utility cross site scriptingNot Defined
 
 
0.03CVE-2022-28707
05/06/2022$0-$5k$0-$5kF5 BIG-IP iControl REST resource consumptionNot Defined
 
 
0.08CVE-2022-1468
05/06/2022$0-$5k$0-$5kQNAP QVR command injectionNot Defined
 
 
0.00CVE-2022-27588
05/06/2022$0-$5k$0-$5kQNAP QuTScloud/QuTS hero/QTS command injectionNot Defined
 
 
0.07CVE-2021-44051
05/06/2022$0-$5k$0-$5kF5 NGINX Service Mesh Control Plane Endpoint missing authenticationNot Defined
 
 
0.09CVE-2022-27495
05/06/2022$0-$5k$0-$5kArgo Workflows privileges managementNot Defined
 
 
0.03CVE-2022-29164
05/06/2022$0-$5k$0-$5kWebKitGTK TextureMapperLayer.cpp setContentsLayer heap-based overflowNot Defined
 
 
0.00CVE-2022-30293
05/06/2022$0-$5k$0-$5kWebKitGTK TextureMapperLayer.cpp setContentsLayer use after freeNot Defined
 
 
0.00CVE-2022-30294
05/06/2022$0-$5k$0-$5kRsyslog Diagnostics Module buffer overflowNot Defined
 
 
0.00CVE-2022-24903
05/06/2022$0-$5k$0-$5kF5 F5OS-A information disclosureNot Defined
 
 
0.00CVE-2022-25990
05/06/2022$0-$5k$0-$5kF5 Access information disclosureNot Defined
 
 
0.03CVE-2022-27875
05/06/2022$0-$5k$0-$5kSourcegraph gitserver Service injectionNot Defined
 
 
0.00CVE-2022-29171
05/06/2022$0-$5k$0-$5kVyper integer overflowNot Defined
 
 
0.07CVE-2022-29175
05/06/2022$0-$5k$0-$5kgo-tuf improper validation of integrity check valueNot Defined
 
 
0.03CVE-2022-29173
05/06/2022$0-$5k$0-$5kQNAP Video Station authorizationNot Defined
 
 
0.07CVE-2021-44055
05/06/2022$0-$5k$0-$5kBig BIG-IP DNS Resolver Configuration unusual conditionNot Defined
 
 
0.07CVE-2022-28706
05/06/2022$0-$5k$0-$5kAnker Eufy Homebase libxm_av.so DemuxCmdInBuffer integer overflowNot Defined
 
 
0.05CVE-2022-26073
05/06/2022$0-$5k$0-$5kFlux2/helm-controller/kustomize-controller code injectionNot Defined
 
 
0.00CVE-2022-24817
05/06/2022$0-$5k$0-$5kRubygems authorizationNot Defined
 
 
0.07CVE-2022-29176
05/06/2022$0-$5k$0-$5kTrojan-Ransom.LockerGoga wow64log.dll untrusted search pathProof-of-Concept
 
Link0.04
05/06/2022$0-$5k$0-$5kTrojan.Ransom.Cryptowall urlmon.dll untrusted search pathProof-of-Concept
 
Link0.03

62 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!