Exploits 04/30/2019info

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang »

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTICVE
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 Web Interface Default Credentials weak authenticationNot Defined
 
 
0.00CVE-2019-3939
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 Configuration File weak encryptionNot Defined
 
 
0.00CVE-2019-3938
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 scfgdndf Credentials weak encryptionNot Defined
 
 
0.00CVE-2019-3937
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 Service Port 389 denial of serviceNot Defined
 
 
0.00CVE-2019-3936
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 Slie Show conference.cgi privilege escalationNot Defined
 
 
0.00CVE-2019-3935
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 login.cgi information disclosureNot Defined
 
 
0.10CVE-2019-3934
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 browserslide.jpg weak encryptionNot Defined
 
 
0.00CVE-2019-3933
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 return.tgi weak authenticationNot Defined
 
 
0.00CVE-2019-3932
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 cURL return.cgi Injection privilege escalationNot Defined
 
 
0.00CVE-2019-3931
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 libAwgCgi.so PARSERtoCHAR Stack-based memory corruptionNot Defined
 
 
0.00CVE-2019-3930
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 HTTP Endpoint file_transfer.cgi command injectionNot Defined
 
 
0.05CVE-2019-3929
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 SNMP privilege escalationNot Defined
 
 
0.00CVE-2019-3928
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 SNMP privilege escalationNot Defined
 
 
0.00CVE-2019-3927
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 SNMP command injectionNot Defined
 
 
0.00CVE-2019-3926
04/30/2019$0-$5k$0-$5kCrestron AM-100/AM-101 SNMP command injectionNot Defined
 
 
0.00CVE-2019-3925
04/30/2019$0-$5k$0-$5ksigning-party gpg-key2ps Shell privilege escalationNot Defined
 
 
0.00CVE-2019-11627
04/30/2019$0-$5k$0-$5kdoorGets ajaxRouter.php Path information disclosureNot Defined
 
 
0.00CVE-2019-11626
04/30/2019$0-$5k$0-$5kdoorGets emailingRequest.php sql injectionNot Defined
 
 
0.00CVE-2019-11625
04/30/2019$0-$5k$0-$5kdoorGets configurationRequest.php directory traversalNot Defined
 
 
0.00CVE-2019-11624
04/30/2019$0-$5k$0-$5kdoorGets configurationRequest.php sql injectionNot Defined
 
 
0.00CVE-2019-11623
04/30/2019$0-$5k$0-$5kdoorGets modulecategoryRequest.php sql injectionNot Defined
 
 
0.00CVE-2019-11622
04/30/2019$0-$5k$0-$5kdoorGets configurationRequest.php sql injectionNot Defined
 
 
0.00CVE-2019-11621
04/30/2019$0-$5k$0-$5kdoorGets modulecategoryRequest.php sql injectionNot Defined
 
 
0.00CVE-2019-11620
04/30/2019$0-$5k$0-$5kdoorGets configurationRequest.php sql injectionNot Defined
 
 
0.00CVE-2019-11619
04/30/2019$0-$5k$0-$5kdoorGets Access Token index.php weak authenticationNot Defined
 
 
0.00CVE-2019-11618
04/30/2019$0-$5k$0-$5kdoorGets configurationRequest.php cross site request forgeryNot Defined
 
 
0.00CVE-2019-11617
04/30/2019$0-$5k$0-$5kdoorGets admin.php Password information disclosureNot Defined
 
 
0.00CVE-2019-11616
04/30/2019$0-$5k$0-$5kdoorGets File Upload upload.php Backdoor privilege escalationNot Defined
 
 
0.00CVE-2019-11615
04/30/2019$0-$5k$0-$5kdoorGets commentView.php sql injectionNot Defined
 
 
0.00CVE-2019-11614
04/30/2019$0-$5k$0-$5kdoorGets contactView.php sql injectionNot Defined
 
 
0.00CVE-2019-11613
04/30/2019$0-$5k$0-$5kdoorGets deletefile.php directory traversalNot Defined
 
 
0.00CVE-2019-11612
04/30/2019$0-$5k$0-$5kdoorGets download.php information disclosureNot Defined
 
 
0.00CVE-2019-11611
04/30/2019$0-$5k$0-$5kdoorGets downloaddir.php information disclosureNot Defined
 
 
0.00CVE-2019-11610
04/30/2019$0-$5k$0-$5kdoorGets movefile.php information disclosureNot Defined
 
 
0.00CVE-2019-11609
04/30/2019$0-$5k$0-$5kdoorGets renamefile.php information disclosureNot Defined
 
 
0.00CVE-2019-11608
04/30/2019$0-$5k$0-$5kdoorGets copydir.php information disclosureNot Defined
 
 
0.00CVE-2019-11607
04/30/2019$0-$5k$0-$5kdoorGets copyfile.php information disclosureNot Defined
 
 
0.00CVE-2019-11606
04/30/2019$5k-$25k$5k-$25kApache Archiva Artifact Upload directory traversalNot Defined
 
 
0.00CVE-2019-0214
04/30/2019$5k-$25k$0-$5kApache Archiva Artifact Upload directory traversalNot Defined
 
 
0.00CVE-2019-0213
04/30/2019$5k-$25k$5k-$25kApache Camel directory traversalNot Defined
 
 
0.00CVE-2019-0194

Do you know our Splunk app?

Download it now for free!