Exploits 01/30/2019info

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang »

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTICVE
01/30/2019$0-$5k$0-$5kidreamsoft iCMS editor.admincp.php directory traversalNot Defined
 
 
0.00CVE-2019-7237
01/30/2019$0-$5k$0-$5kidreamsoft iCMS editor.admincp.php directory traversalNot Defined
 
 
0.00CVE-2019-7236
01/30/2019$0-$5k$0-$5kidreamsoft iCMS directory traversalNot Defined
 
 
0.00CVE-2019-7235
01/30/2019$0-$5k$0-$5kidreamsoft iCMS directory traversalNot Defined
 
 
0.00CVE-2019-7234
01/30/2019$0-$5k$0-$5klibdoc catdoc.c doc2text NULL Pointer Dereference denial of serviceNot Defined
 
 
0.00CVE-2019-7233
01/30/2019$0-$5k$0-$5kLabKey Server Community Edition Mount denial of serviceNot Defined
 
 
0.00CVE-2019-3913
01/30/2019$0-$5k$0-$5kLabKey Server Community Edition Open RedirectNot Defined
 
 
0.00CVE-2019-3912
01/30/2019$0-$5k$0-$5kLabKey Server Community Edition query Reflected cross site scriptingNot Defined
 
 
0.00CVE-2019-3911
01/30/2019$0-$5k$0-$5kPalo Alto PAN-OS Management Web Interface cross site scriptingNot Defined
 
 
0.00CVE-2019-1566
01/30/2019$0-$5k$0-$5kPalo Alto PAN-OS External Dynamics List privilege escalationNot Defined
 
 
0.00CVE-2019-1565
01/30/2019$5k-$25k$5k-$25kApache HTTP Server mod_ssl Loop denial of serviceNot Defined
 
 
0.00CVE-2019-0190
01/30/2019$0-$5k$0-$5kFoxit PDF Reader XFA Element Out-of-Bounds memory corruptionNot Defined
 
 
0.00CVE-2018-3956
01/30/2019$0-$5k$0-$5kLibVNCServer rfbserver.c Out-of-Bounds memory corruptionNot Defined
 
 
0.00CVE-2018-20750
01/30/2019$0-$5k$0-$5kLibVNCServer rfbserver.c Out-of-Bounds memory corruptionNot Defined
 
 
0.00CVE-2018-20749
01/30/2019$0-$5k$0-$5kLibVNC rfbproto.c Out-of-Bounds memory corruptionNot Defined
 
 
0.00CVE-2018-20748
01/30/2019$0-$5k$0-$5kPrinceXML XML Data XML External EntityNot Defined
 
 
0.00CVE-2018-19858
01/30/2019$0-$5k$0-$5kFreshRSS cross site scriptingProof-of-Concept
 
Link0.00CVE-2018-19782
01/30/2019$0-$5k$0-$5kARM Trusted Firmware-A information disclosureNot Defined
 
 
0.00CVE-2018-19440
01/30/2019$0-$5k$0-$5kCX-One/CX-Protocol Type Confusion memory corruptionNot Defined
 
 
0.00CVE-2018-19027
01/30/2019$5k-$25k$0-$5kCisco WebEx Meetings Server Castor XML XML External EntityNot Defined
 
 
0.00CVE-2018-18895
01/30/2019$0-$5k$0-$5kComodo UTM Firewall Web Console Remote Code ExecutionNot Defined
 
 
0.00CVE-2018-17431
01/30/2019$25k-$100k$25k-$100kApache HTTP Server mod_session Expired privilege escalationNot Defined
 
 
0.00CVE-2018-17199
01/30/2019$5k-$25k$5k-$25kApache HTTP Server mod_http2 Slowloris denial of serviceNot Defined
 
 
0.00CVE-2018-17189
01/30/2019$0-$5k$0-$5kTitanHQ SpamTitan Anti-Spam Filter Bypass privilege escalationNot Defined
 
 
0.00CVE-2018-15136
01/30/2019$0-$5k$0-$5kOX Software App Suite directory traversalNot Defined
 
 
0.00CVE-2018-12611
01/30/2019$0-$5k$0-$5kOX Software App Suite information disclosureNot Defined
 
 
0.00CVE-2018-12610
01/30/2019$0-$5k$0-$5kOX Software App Suite Server-Side Request ForgeryNot Defined
 
 
0.00CVE-2018-12609

Want to stay up to date on a daily basis?

Enable the mail alert feature now!