Exploits 06/07/2018info

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang »

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTICVE
06/07/2018$25k-$100k$5k-$25kAdobe Flash Player Out-of-Bounds memory corruptionNot Defined
 
 
0.00CVE-2018-5001
06/07/2018$25k-$100k$5k-$25kAdobe Flash Player Integer memory corruptionNot Defined
 
 
0.00CVE-2018-5000
06/07/2018$25k-$100k$5k-$25kAdobe Flash Player Stack-Based memory corruptionNot Defined
 
 
0.00CVE-2018-5002
06/07/2018$25k-$100k$5k-$25kAdobe Flash Player Type Confusion memory corruptionNot Defined
 
 
0.00CVE-2018-4945
06/07/2018$0-$5k$0-$5kopenSUSE Open Build Service InitializeDevelPackage privilege escalationNot Defined
 
 
0.00CVE-2018-7689
06/07/2018$0-$5k$0-$5kopenSUSE Open Build Service privilege escalationNot Defined
 
 
0.00CVE-2018-7688
06/07/2018$5k-$25k$5k-$25kMcAfee Common UI ePO Extension privilege escalationNot Defined
 
 
0.00CVE-2018-6670
06/07/2018$0-$5k$0-$5kexpress-cart Module privilege escalationNot Defined
 
 
0.00CVE-2018-3758
06/07/2018$5k-$25k$5k-$25kIBM CSV Export privilege escalationNot Defined
 
 
0.00CVE-2018-1547
06/07/2018$5k-$25k$0-$5kIBM cross site request forgeryNot Defined
 
 
0.00CVE-2018-1514
06/07/2018$0-$5k$0-$5kSymphony content.blueprintspages.php cross site scriptingNot Defined
 
 
0.00CVE-2018-12043
06/07/2018$0-$5k$0-$5kRoxy Fileman download.php directory traversalNot Defined
 
 
0.05CVE-2018-12042
06/07/2018$0-$5k$0-$5kjoyplus-cms index.php Remote Code ExecutionNot Defined
 
 
0.00CVE-2018-12039
06/07/2018$0-$5k$0-$5kOWASP Dependency-Check Archive directory traversalNot Defined
 
 
0.00CVE-2018-12036
06/07/2018$0-$5k$0-$5kEaton Intelligent Power Manager node_upgrade_srv.js downloadFirmware Local File InclusionNot Defined
 
 
0.00CVE-2018-12031
06/07/2018$0-$5k$0-$5kGNOME Web libephymain.so Crash denial of serviceNot Defined
 
 
0.00CVE-2018-12016
06/07/2018$0-$5k$0-$5kPerl Tar Symlink directory traversalNot Defined
 
 
0.00CVE-2018-12015
06/07/2018$0-$5k$0-$5kRSLinx Classic/FactoryTalk Linx Gateway privilege escalationProof-of-Concept
 
Link0.00CVE-2018-10619
06/07/2018$5k-$25k$0-$5kCisco WebEx Web Framework cross site scriptingNot Defined
 
 
0.00CVE-2018-0357
06/07/2018$5k-$25k$0-$5kCisco WebEx Web Framework cross site scriptingNot Defined
 
 
0.00CVE-2018-0356
06/07/2018$5k-$25k$0-$5kCisco Unified Communications Manager Web UI Clickjacking cross site scriptingNot Defined
 
 
0.00CVE-2018-0355
06/07/2018$5k-$25k$0-$5kCisco Unity Connection Web Framework cross site scriptingNot Defined
 
 
0.00CVE-2018-0354
06/07/2018$25k-$100k$5k-$25kCisco Web Security Appliance Traffic Monitor Bypass privilege escalationNot Defined
 
 
0.00CVE-2018-0353
06/07/2018$5k-$25k$5k-$25kCisco Wide Area Application Services disk-check.sh privilege escalationNot Defined
 
 
0.00CVE-2018-0352
06/07/2018$5k-$25k$0-$5kCisco Unified Communications Manager Web Framework cross site scriptingNot Defined
 
 
0.00CVE-2018-0340
06/07/2018$5k-$25k$0-$5kCisco Identity Services Engine Web-based Management Interface cross site scriptingNot Defined
 
 
0.00CVE-2018-0339
06/07/2018$5k-$25k$5k-$25kCisco Unified Computing System RBAC privilege escalationNot Defined
 
 
0.00CVE-2018-0338
06/07/2018$5k-$25k$5k-$25kCisco Prime Collaboration Provisioning Batch Provisioning privilege escalationNot Defined
 
 
0.00CVE-2018-0336
06/07/2018$0-$5k$0-$5kCisco Prime Collaboration Provisioning Web Portal Cleartext information disclosureNot Defined
 
 
0.00CVE-2018-0335
06/07/2018$5k-$25k$5k-$25kCisco AnyConnect Network Access Manager TLS Certificate Management Subsystem privilege escalationNot Defined
 
 
0.00CVE-2018-0334

Want to stay up to date on a daily basis?

Enable the mail alert feature now!