Exploits 01/27/2020info

Type »

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang »

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTICVE
01/27/2020$5k-$25k$0-$5kSuSE Linux Enterprise Server obs-service-tar_scm path traversalNot Defined
 
 
0.00CVE-2018-12476
01/27/2020$5k-$25k$0-$5kTYPO3 svg.swf cross site scritingNot Defined
 
 
0.00CVE-2020-8091
01/27/2020$0-$5k$0-$5kTP-LINK TL-WR849N Firmware softup authenticationNot Defined
 
 
0.00CVE-2019-19143
01/27/2020$0-$5k$0-$5kLustre File System Packet lustre_msg_string out-of-bounds writeNot Defined
 
 
0.00CVE-2019-20425
01/27/2020$0-$5k$0-$5kLustre File System ptlrpc Module target_handle_connect buffer overflowNot Defined
 
 
0.00CVE-2019-20423
01/27/2020$0-$5k$0-$5kLustre File System ptlrpc Module osd_map_remote_to_local out-of-bounds writeNot Defined
 
 
0.00CVE-2019-20431
01/27/2020$0-$5k$0-$5kLustre File System ptlrpc Module sptlrpc_svc_unwrap_request out-of-bounds readNot Defined
 
 
0.00CVE-2019-20429
01/27/2020$0-$5k$0-$5kLustre File System ptlrpc Module ldlm_cancel_hpreq_check out-of-bounds writeNot Defined
 
 
0.00CVE-2019-20426
01/27/2020$0-$5k$0-$5kLustre File System mdt Module mdt_file_secctx_unpack out-of-bounds writeNot Defined
 
 
0.00CVE-2019-20432
01/27/2020$0-$5k$0-$5kLustre File System ptlrpc Module ldl_request_cancel out-of-bounds readNot Defined
 
 
0.00CVE-2019-20428
01/27/2020$0-$5k$0-$5kLustre File System ptlrpc Module req_capsule_get_size buffer overflowNot Defined
 
 
0.00CVE-2019-20427
01/27/2020$0-$5k$0-$5kGNU Aspell libaspell.a out-of-bounds readNot Defined
 
 
0.00CVE-2019-20433
01/27/2020$0-$5k$0-$5kValve Dota Map meshsystem.dll code injectionNot Defined
 
 
0.00CVE-2020-7951
01/27/2020$0-$5k$0-$5kNetty Incomplete Fix CVE-2019-16869 HTTP Smuggling request smugglingNot Defined
 
 
0.00CVE-2020-7238
01/27/2020$0-$5k$0-$5kSMC Networks D3G0804W Network Diagnostic Tools formSetDiagnosticToolsFmPing command injectionNot Defined
 
 
0.04CVE-2020-8087
01/27/2020$0-$5k$0-$5kBitDefender BOX 2 Bootstrap get_image_url os command injectionNot Defined
 
 
0.00CVE-2019-17096
01/27/2020$0-$5k$0-$5kSuSE Linux Enterprise Server 15 yast2-rmt Log log fileNot Defined
 
 
0.00CVE-2018-20105
01/27/2020$0-$5k$0-$5kValve Dota Map schemasystem.dll GetValue code injectionNot Defined
 
 
0.00CVE-2020-7949
01/27/2020$0-$5k$0-$5kValve Dota Map meshsystem.dll code injectionNot Defined
 
 
0.00CVE-2020-7950
01/27/2020$0-$5k$0-$5kValve Dota Map rendersystemdx9.dll code injectionNot Defined
 
 
0.00CVE-2020-7952
01/27/2020$0-$5k$0-$5kTOTOLINK Realtek SDK formSysCmd os command injectionNot Defined
 
 
0.00CVE-2019-19824
01/27/2020$0-$5k$0-$5kKtor Proxy request smugglingNot Defined
 
 
0.00CVE-2020-5207
01/27/2020$0-$5k$0-$5kBitDefender BOX 2 API update_setup unknown vulnerabilityNot Defined
 
 
0.06CVE-2019-17102
01/27/2020$0-$5k$0-$5kSylius Channel request smugglingNot Defined
 
 
0.00CVE-2020-5218
01/27/2020$0-$5k$0-$5kAvast Secure Browser Update Check AvastBrowserUpdate.exe privileges managementNot Defined
 
 
0.00CVE-2019-17190
01/27/2020$0-$5k$0-$5kSylius ResourceBundle request smugglingNot Defined
 
 
0.04CVE-2020-5220
01/27/2020$0-$5k$0-$5kAVB MOTU path traversalNot Defined
 
 
0.06CVE-2020-8009
01/27/2020$0-$5k$0-$5kLinux Kernel ip6_fib.c fib6_rule_lookup handling of exceptional conditionsNot Defined
 
 
0.00CVE-2019-20422
01/27/2020$0-$5k$0-$5kIntellian Aptus hard-coded credentialsNot Defined
 
 
0.00CVE-2020-7999
01/27/2020$0-$5k$0-$5kIntellian Aptus FTP hard-coded credentialsNot Defined
 
 
0.08CVE-2020-8001
01/27/2020$0-$5k$0-$5kIntellian Aptus Web hard-coded credentialsNot Defined
 
 
0.06CVE-2020-8000
01/27/2020$0-$5k$0-$5knetprint App X.509 Certificate certificate validationNot Defined
 
 
0.00CVE-2020-5520
01/27/2020$0-$5k$0-$5kkantan netprint App X.509 Certificate certificate validationNot Defined
 
 
0.00CVE-2020-5522
01/27/2020$0-$5k$0-$5kkantan netprint App X.509 Certificate certificate validationNot Defined
 
 
0.00CVE-2020-5521
01/27/2020$0-$5k$0-$5kBelkin WeMo Insight Switch libbelkin_api.so stack-based buffer overflowNot Defined
 
 
0.00CVE-2019-17094
01/27/2020$0-$5k$0-$5kTOTOLINK Realtek SDK Captcha formLogin authenticationNot Defined
 
 
0.08CVE-2019-19825
01/27/2020$0-$5k$0-$5kTOTOLINK/CIK TELECOM/KCTVJEJU/Hi-Wifi/HCN/T-broad Router Administration Interface Config insufficiently protected credentialsNot Defined
 
 
0.00CVE-2019-19822
01/27/2020$0-$5k$0-$5kPivotal tc Server/tc Runtimes JMX Socket Listener privileges managementNot Defined
 
 
0.09CVE-2019-11288
01/27/2020$0-$5k$0-$5kBitDefender BOX 2 API download_image os command injectionNot Defined
 
 
0.00CVE-2019-17095
01/27/2020$0-$5k$0-$5kBitDefender AV BDLDaemon default permissionNot Defined
 
 
0.00CVE-2019-17103
01/27/2020$0-$5k$0-$5kUseBB panel_login.php Type Juggling type confusionNot Defined
 
 
0.00CVE-2020-8088
01/27/2020$0-$5k$0-$5kSymmetric DS mx4j authenticationNot Defined
 
 
0.00CVE-2020-24231
01/27/2020$0-$5k$0-$5kF-RevoCRM cross site scriptingNot Defined
 
 
0.00CVE-2019-6036
01/27/2020$0-$5k$0-$5kSynacor Zimbra Collaboration Reflected cross site scriptingNot Defined
 
 
0.09CVE-2019-15313
01/27/2020$0-$5k$0-$5kSynacor Zimbra Collaboration Persistent cross site scriptingNot Defined
 
 
0.00CVE-2019-8945
01/27/2020$0-$5k$0-$5kSynacor Zimbra Collaboration Persistent cross site scriptingNot Defined
 
 
0.00CVE-2019-8946
01/27/2020$0-$5k$0-$5kSynacor Zimbra Collaboration Reflected cross site scriptingNot Defined
 
 
0.00CVE-2019-8947
01/27/2020$0-$5k$0-$5kLustre File System mdt Module null pointer dereferenceNot Defined
 
 
0.00CVE-2019-20424
01/27/2020$0-$5k$0-$5kLustre File System mdt Module input validationNot Defined
 
 
0.00CVE-2019-20430
01/27/2020$0-$5k$0-$5kExiv2 jp2image.cpp readMetadata infinite loopNot Defined
 
 
0.00CVE-2019-20421

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!