Exploits January 2022

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation

Official Fix7
Temporary Fix0
Workaround20
Unavailable0
Not Defined48

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High1
Functional0
Proof-of-Concept74
Unproven0
Not Defined0

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang

C1
Python1
C++1

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base

≤10
≤20
≤30
≤49
≤511
≤610
≤729
≤814
≤91
≤101

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤31
≤417
≤511
≤628
≤716
≤80
≤92
≤100

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k17
<2k31
<5k22
<10k2
<25k1
<50k0
<100k1
≥100k1

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k74
<2k1
<5k0
<10k0
<25k0
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTIEPSSCVE
01/31/2022$0-$5k$0-$5kGit Pull git.cmd access controlProof-of-Concept
 
Link0.000.00885CVE-2021-46101
01/31/2022$0-$5k$0-$5kxterm Sixel Support graphics_sixel.c set_sixel buffer overflowProof-of-Concept
 
Link0.040.01108CVE-2022-24130
01/29/2022$0-$5k$0-$5kBackdoor.Win32.Tiny.c Service Port 7778 backdoorProof-of-Concept
 
Link0.040.00000
01/29/2022$0-$5k$0-$5kHackTool.Win32.Muzzer.a File heap-based overflowProof-of-Concept
 
Link0.040.00000
01/29/2022$0-$5k$0-$5kH.H.G. Multistore sql injectionProof-of-Concept
 
Link0.040.00885CVE-2021-46448
01/29/2022$0-$5k$0-$5kH.H.G. Multistore sql injectionProof-of-Concept
 
Link0.030.00885CVE-2021-46446
01/29/2022$0-$5k$0-$5kH.H.G. Multistore sql injectionProof-of-Concept
 
Link0.060.00885CVE-2021-46445
01/29/2022$0-$5k$0-$5kH.H.G. Multistore sql injectionProof-of-Concept
 
Link0.070.00885CVE-2021-46444
01/29/2022$0-$5k$0-$5kSourceCodester Gadget Works Online Ordering System index.php cross site scriptingProof-of-Concept
 
Link0.030.00885CVE-2021-34073
01/28/2022$0-$5k$0-$5kOnline Motorcycle Rental System Login Portal sql injectionProof-of-Concept
 
Link0.050.00885CVE-2021-44249
01/28/2022$0-$5k$0-$5kSourcecodester Simple Chatbot Application Master.php sql injectionProof-of-Concept
 
Link0.040.01018CVE-2021-46427
01/28/2022$0-$5k$0-$5kSourcecodester Simple Chatbot Application SystemSettings.php Privilege EscalationProof-of-Concept
 
Link0.060.01978CVE-2021-46428
01/26/2022$0-$5k$0-$5kmingsoft MCMS sql injectionProof-of-Concept
 
Link0.040.00885CVE-2021-46385
01/26/2022$0-$5k$0-$5kmingsoft MCMS unrestricted uploadProof-of-Concept
 
Link0.040.01338CVE-2021-46386
01/26/2022$0-$5k$0-$5kmingSoft MCMS sql injectionProof-of-Concept
 
Link0.060.00885CVE-2021-46383
01/26/2022$0-$5k$0-$5kSourcecodtester Hospital Patient Records Management System doctors.php cross site scriptingProof-of-Concept
 
Link0.030.02561CVE-2022-22851
01/26/2022$0-$5k$0-$5kpolkit pkexec access controlProof-of-ConceptCLink0.080.13064CVE-2021-4034
01/25/2022$0-$5k$0-$5kCosaNostra Builder WebPanel hash without saltProof-of-Concept
 
Link0.090.00000
01/25/2022$0-$5k$0-$5kCosaNostra Builder permissionProof-of-Concept
 
Link0.050.00000
01/25/2022$0-$5k$0-$5kBackdoor.Win32.FTP.Lana.01.d Service Port 6666 hard-coded passwordProof-of-Concept
 
Link0.030.00000
01/25/2022$0-$5k$0-$5kBackdoor.Win32.FTP99 Service Port 1492 hard-coded passwordProof-of-Concept
 
Link0.000.00000
01/25/2022$0-$5k$0-$5kBackdoor.Win32.Agent.uq permissionProof-of-Concept
 
Link0.030.00000
01/25/2022$0-$5k$0-$5kBackdoor.Win32.FTP.Lana.01.d Service Port 6666 information disclosureProof-of-Concept
 
Link0.030.00000
01/25/2022$0-$5k$0-$5kBackdoor.Win32.FTP99 Service Port 1492 information disclosureProof-of-Concept
 
Link0.030.00000
01/25/2022$0-$5k$0-$5kBackdoor.Win32.DRA.c Service Port 3119 hard-coded passwordProof-of-Concept
 
Link0.050.00000
01/25/2022$0-$5k$0-$5kCosaNostra Builder WebPanel cross-site request forgeryProof-of-Concept
 
Link0.000.00000
01/25/2022$0-$5k$0-$5kBackdoor.Win32.Hanuman.b Service Port 3333 backdoorProof-of-Concept
 
Link0.060.00000
01/22/2022$0-$5k$0-$5kconvert-svg-core SVG File information disclosureProof-of-Concept
 
Link0.030.01018CVE-2021-23631
01/22/2022$0-$5k$0-$5kHMS patientlogin.php sql injectionProof-of-Concept
 
Link0.030.01018CVE-2022-23366
01/22/2022$0-$5k$0-$5kHMS doctorlogin.php sql injectionProof-of-Concept
 
Link0.070.00885CVE-2022-23365
01/22/2022$0-$5k$0-$5kHMS adminlogin.php sql injectionProof-of-Concept
 
Link0.030.00885CVE-2022-23364
01/22/2022$0-$5k$0-$5kOnline Banking System index.php sql injectionProof-of-Concept
 
Link0.060.00885CVE-2022-23363
01/21/2022$0-$5k$0-$5kBackdoor.Win32.Wollf.16 Service Port 1015 improper authenticationProof-of-Concept
 
Link0.040.00000
01/21/2022$0-$5k$0-$5kBackdoor.Win32.Wollf.16 Service Port 1015 hard-coded credentialsProof-of-Concept
 
Link0.050.00000
01/21/2022$5k-$25k$0-$5kTrend Micro Deep Security Agent Task GetCopiedFile pathname traversalProof-of-Concept
 
Link0.040.00885CVE-2022-23119
01/21/2022$5k-$25k$0-$5kTrend Micro Deep Security Agent ActivateAgent Command code injectionProof-of-Concept
 
Link0.050.00885CVE-2022-23120
01/20/2022$0-$5k$0-$5kTIBCO Ransomware Builder Babuk permissionProof-of-Concept
 
Link0.030.00000
01/20/2022$0-$5k$0-$5kVulturiBuilder permissionProof-of-Concept
 
Link0.030.00000
01/20/2022$0-$5k$0-$5kCollectorStealerBuilder certificate validationProof-of-Concept
 
Link0.070.00000
01/20/2022$0-$5k$0-$5kCollectorStealerBuilder cleartext storageProof-of-Concept
 
Link0.000.00000
01/20/2022$0-$5k$0-$5kBackdoor.Win32.Wisell Service Port 5277 backdoorProof-of-Concept
 
Link0.030.00000
01/20/2022$0-$5k$0-$5kCacti URL Parameter auth_changepassword.php cross site scriptingProof-of-Concept
 
Link0.000.01055CVE-2021-26247
01/19/2022$0-$5k$0-$5kSourcecodester Car Rental Management System cross site scriptingProof-of-Concept
 
Link0.030.04983CVE-2021-46005
01/18/2022$0-$5k$0-$5kSourceCodester Free School Management Software unrestricted uploadProof-of-Concept
 
Link0.040.01424CVE-2021-46013
01/18/2022$0-$5k$0-$5kSoftVibe SARABAN for INFOMA sql injectionProof-of-Concept
 
Link0.030.01018CVE-2021-38694
01/17/2022$0-$5k$0-$5kChaos Ransomeware Builder permissionProof-of-Concept
 
Link0.000.00000
01/17/2022$0-$5k$0-$5kAgent Tesla Builder Web Panel sql injectionProof-of-Concept
 
Link0.030.00000
01/17/2022$0-$5k$0-$5kAgent Tesla Builder Web Panel cross site scriptingProof-of-Concept
 
Link0.000.00000
01/16/2022$0-$5k$0-$5kWin32.MarsStealer Web Panel cross site scriptingProof-of-Concept
 
Link0.030.00000
01/16/2022$0-$5k$0-$5kAb Stealer Web Panel cross site scriptingProof-of-Concept
 
Link0.000.00000

25 more entries are not shown

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!