Exploit Prices 09/23/2022

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation

Official Fix1
Temporary Fix0
Workaround0
Unavailable0
Not Defined21

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High0
Functional0
Proof-of-Concept1
Unproven0
Not Defined21

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base

≤10
≤20
≤30
≤41
≤50
≤618
≤73
≤80
≤90
≤100

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤30
≤41
≤51
≤618
≤72
≤80
≤90
≤100

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k1
<2k3
<5k18
<10k0
<25k0
<50k0
<100k0
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k4
<2k16
<5k2
<10k0
<25k0
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTIEPSSCVE
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6b064d out-of-bounds writeNot Defined
 
 
0.66+0.00000CVE-2022-35038
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6e20a0 out-of-bounds writeNot Defined
 
 
0.62+0.00000CVE-2022-35039
09/23/2022$0-$5k$0-$5kGrafana RBAC permissionsNot Defined
 
 
0.24+0.00000CVE-2022-36062
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x718693 buffer overflowNot Defined
 
 
0.41+0.00000CVE-2022-35021
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6badae memory corruptionNot Defined
 
 
0.38+0.00000CVE-2022-35022
09/23/2022$0-$5k$0-$5kOTFCC memmove-vec-unaligned-erms.S memory corruptionNot Defined
 
 
0.48+0.00000CVE-2022-35024
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x5266a8 memory corruptionNot Defined
 
 
0.55+0.00000CVE-2022-35025
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x4fbc0b memory corruptionNot Defined
 
 
0.55+0.00000CVE-2022-35026
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x4fe9a7 memory corruptionNot Defined
 
 
0.52+0.00000CVE-2022-35027
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x4fbbb6 memory corruptionNot Defined
 
 
0.52+0.00000CVE-2022-35028
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6babea memory corruptionNot Defined
 
 
0.52+0.00000CVE-2022-35029
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x4fe954 memory corruptionNot Defined
 
 
0.45+0.00000CVE-2022-35030
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x703969 memory corruptionNot Defined
 
 
0.52+0.00000CVE-2022-35031
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6b6a8f memory corruptionNot Defined
 
 
0.52+0.00000CVE-2022-35032
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6e7e3d heap-based overflowNot Defined
 
 
0.52+0.00000CVE-2022-35034
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6b559f heap-based overflowNot Defined
 
 
0.55+0.00000CVE-2022-35035
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6e1fc8 heap-based overflowNot Defined
 
 
0.59+0.00000CVE-2022-35036
09/23/2022$0-$5k$0-$5kOTFCC otfccdump+0x6adb1e heap-based overflowNot Defined
 
 
0.59+0.00000CVE-2022-35037
09/23/2022$0-$5k$0-$5kZoo Management System Gallery Module unrestricted uploadNot Defined
 
 
0.24+0.00000CVE-2022-40932
09/23/2022$0-$5k$0-$5kICEcoder pathname traversalProof-of-Concept
 
Link0.21+0.00000CVE-2022-34026
09/23/2022$0-$5k$0-$5kInsydeH2O SMM Driver UsbLegacyControlSmm Privilege EscalationNot Defined
 
 
0.52+0.00000CVE-2022-35408
09/23/2022$0-$5k$0-$5kInsydeH2O SMI information disclosureNot Defined
 
 
0.48+0.00000CVE-2022-35894

Interested in the pricing of exploits?

See the underground prices here!