Exploits 01/09/2018info

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang »

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCVE
01/09/2018$0-$5k$0-$5kSagePay Server Gateway for WooCommerce Plugin redirect.php cross site scriptingNot Defined
 
 
CVE-2018-5316
01/09/2018$25k-$100k$5k-$25kAdobe Flash Player Out-of-Bounds memory corruptionNot Defined
 
 
CVE-2018-4871
01/09/2018$0-$5k$0-$5kIntel Driver and Support Assistant SEMA Driver Memory privilege escalationNot Defined
 
 
CVE-2018-3610
01/09/2018$5k-$25k$0-$5kMicrosoft Office Email Attachment spoofingNot Defined
 
 
CVE-2018-0819
01/09/2018$5k-$25k$0-$5kMicrosoft Word Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0812
01/09/2018$5k-$25k$0-$5kMicrosoft Word Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0807
01/09/2018$5k-$25k$0-$5kMicrosoft Word Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0806
01/09/2018$5k-$25k$0-$5kMicrosoft Word Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0805
01/09/2018$5k-$25k$0-$5kMicrosoft Word Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0804
01/09/2018$5k-$25k$0-$5kMicrosoft Office Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0802
01/09/2018$5k-$25k$0-$5kMicrosoft Office Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0801
01/09/2018$5k-$25k$0-$5kMicrosoft SharePoint Enterprise Server Access cross site scriptingNot Defined
 
 
CVE-2018-0799
01/09/2018$5k-$25k$0-$5kMicrosoft Office Equation Editor memory corruptionNot Defined
 
 
CVE-2018-0798
01/09/2018$5k-$25k$0-$5kMicrosoft Office RTF memory corruptionNot Defined
 
 
CVE-2018-0797
01/09/2018$5k-$25k$0-$5kMicrosoft Excel memory corruptionNot Defined
 
 
CVE-2018-0796
01/09/2018$5k-$25k$0-$5kMicrosoft Office memory corruptionNot Defined
 
 
CVE-2018-0795
01/09/2018$5k-$25k$0-$5kMicrosoft Word memory corruptionNot Defined
 
 
CVE-2018-0794
01/09/2018$5k-$25k$0-$5kMicrosoft Word Email Message memory corruptionNot Defined
 
 
CVE-2018-0793
01/09/2018$5k-$25k$0-$5kMicrosoft Word memory corruptionNot Defined
 
 
CVE-2018-0792
01/09/2018$5k-$25k$0-$5kMicrosoft Outlook Email Message privilege escalationNot Defined
 
 
CVE-2018-0791
01/09/2018$0-$5k$0-$5kMicrosoft SharePoint Server Web Request cross site scriptingNot Defined
 
 
CVE-2018-0790
01/09/2018$0-$5k$0-$5kMicrosoft SharePoint Server Web Request cross site scriptingNot Defined
 
 
CVE-2018-0789
01/09/2018$5k-$25k$0-$5kMicrosoft .NET Security Feature Bypass privilege escalationNot Defined
 
 
CVE-2018-0786
01/09/2018$5k-$25k$0-$5kMicrosoft ASP.NET Core cross site request forgeryNot Defined
 
 
CVE-2018-0785
01/09/2018$25k-$100k$5k-$25kMicrosoft ASP.NET Core Project Template privilege escalationNot Defined
 
 
CVE-2018-0784
01/09/2018$5k-$25k$0-$5kMicrosoft .NET Framework XML denial of serviceNot Defined
 
 
CVE-2018-0764
01/09/2018$0-$5k$0-$5kGM Shanghai OnStar SOS iOS Client Storage Cleartext weak encryptionNot Defined
 
 
CVE-2017-9663
01/09/2018$0-$5k$0-$5kRockwell Automation Allen-Bradley MicroLogix 1400 Stack-based memory corruptionNot Defined
 
 
CVE-2017-16740
01/09/2018$5k-$25k$5k-$25kIBM Tivoli Key Lifecycle Manager URL directory traversalNot Defined
 
 
CVE-2017-1671
01/09/2018$5k-$25k$5k-$25kIBM Tivoli Key Lifecycle Manager Back-End Database sql injectionNot Defined
 
 
CVE-2017-1670

Do you need the next level of professionalism?

Upgrade your account now!