Exploits September 2022

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Remediation

Official Fix3
Temporary Fix0
Workaround6
Unavailable0
Not Defined29

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High1
Functional0
Proof-of-Concept37
Unproven0
Not Defined0

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Lang

Python2
Video1
Assembler1

The automatization and the exploitation of a security vulnerability is called an exploit. It is possible to determine the popularity and availability of programming languages used for creating such exploits.

CVSSv3 Base

≤10
≤20
≤31
≤44
≤53
≤65
≤713
≤810
≤92
≤100

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤31
≤45
≤53
≤616
≤710
≤83
≤90
≤100

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k6
<2k14
<5k17
<10k0
<25k1
<50k0
<100k0
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k37
<2k1
<5k0
<10k0
<25k0
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Published0dayTodayTrVulnerabilityExpLangURLCTIEPSSCVE
09/26/2022$0-$5k$0-$5kAcademy Learning Management System cross site scriptingProof-of-Concept
 
Link3.44-0.00000CVE-2022-38553
09/26/2022$0-$5k$0-$5kContec FXA3200 Wireless LAN Manager Interface shadow hard-coded passwordProof-of-Concept
 
Link2.41-0.00000CVE-2022-36159
09/26/2022$0-$5k$0-$5kContec FXA3200 Wireless LAN Manager Interface mnt_cmd.cgi permissionProof-of-Concept
 
Link4.39-0.00000CVE-2022-36158
09/26/2022$0-$5k$0-$5kBackdoor.Win32.Psychward.b Service Port 8888 hard-coded credentialsProof-of-Concept
 
Link3.71-0.00000
09/26/2022$0-$5k$0-$5kBackdoor.Win32.Augudor.b Service Port 810 backdoorProof-of-Concept
 
Link2.88-0.00000
09/25/2022$0-$5k$0-$5kBackdoor.Win32.Bingle.b Service Port 22 hard-coded passwordProof-of-Concept
 
Link0.910.00000
09/24/2022$0-$5k$0-$5kJodit Editor cross site scriptingProof-of-Concept
 
Link0.990.00885CVE-2022-23461
09/23/2022$0-$5k$0-$5kcURL Cookie denial of serviceProof-of-Concept
 
Link0.280.00885CVE-2022-35252
09/23/2022$0-$5k$0-$5kICEcoder pathname traversalProof-of-Concept
 
Link0.080.01018CVE-2022-34026
09/22/2022$0-$5k$0-$5koretnom23 Online Pet Shop We App sql injectionProof-of-Concept
 
Link0.000.00885CVE-2022-40935
09/22/2022$0-$5k$0-$5koretnom23 Online Pet Shop We App sql injectionProof-of-Concept
 
Link0.000.00885CVE-2022-40934
09/22/2022$0-$5k$0-$5koretnom23 Online Pet Shop We App sql injectionProof-of-Concept
 
Link0.040.00885CVE-2022-40933
09/20/2022$0-$5k$0-$5kTrojan-Dropper.Win32.Corty.10 cleartext storage in the registryProof-of-Concept
 
Link0.000.00000
09/20/2022$0-$5k$0-$5kBackdoor.Win32.Hellza.120 Service 12122 improper authenticationProof-of-Concept
 
Link0.060.00000
09/20/2022$0-$5k$0-$5kBackdoor.Win32.Hellza.120 backdoorProof-of-Concept
 
Link0.080.00000
09/20/2022$0-$5k$0-$5kTrojan.Ransom.Ryuk.A uncontrolled search pathProof-of-Concept
 
Link0.110.00000
09/19/2022$0-$5k$0-$5kNecta WiFi Mouse client-side authenticationHighPythonLink0.120.58589CVE-2022-3218
09/17/2022$0-$5k$0-$5k6Kare Emakin Activity Stream Page setProfile cross site scriptingProof-of-Concept
 
Link0.070.00885CVE-2020-25491
09/16/2022$5k-$25k$0-$5kGoogle Earth Pro uncontrolled search pathProof-of-ConceptVideoLink0.430.00000
09/15/2022$0-$5k$0-$5kHoYoVerse Genshin Impact Anti-Cheat Driver Function Call mhyprot2.sys Privilege EscalationProof-of-Concept
 
Link0.190.01365CVE-2020-36603
09/14/2022$0-$5k$0-$5kNintendo Game Boy Color Mobile Adapter GB Tetsuji memory corruptionProof-of-ConceptAssemblerLink0.630.00885CVE-2022-3216
09/14/2022$0-$5k$0-$5kHospital Management System Login Page sql injectionProof-of-Concept
 
Link0.110.00885CVE-2022-38637
09/14/2022$0-$5k$0-$5kCuppaCMS index.php Privilege EscalationProof-of-ConceptPythonLink0.000.01978CVE-2022-37190
09/13/2022$0-$5k$0-$5kZephyr Project Manager admin-ajax.php sql injectionProof-of-Concept
 
Link0.140.00885CVE-2022-2840
09/07/2022$0-$5k$0-$5kTrojan.Win32.Autoit.fhj vp8decoder.dll permissionProof-of-Concept
 
Link0.040.00000
09/07/2022$0-$5k$0-$5kTrojan-Spy.Win32.Pophot.bsl Batch File access controlProof-of-Concept
 
Link0.040.00000
09/07/2022$0-$5k$0-$5kTrojan-Ransom.Win32.Hive.bv permissionProof-of-Concept
 
Link0.040.00000
09/07/2022$0-$5k$0-$5kTrojan.Win32.Autoit.fhj permissionProof-of-Concept
 
Link0.000.00000
09/07/2022$0-$5k$0-$5kBackdoor.Win32.Hupigon.aspg unquoted search pathProof-of-Concept
 
Link0.070.00000
09/07/2022$0-$5k$0-$5kBackdoor.Win32.Winshell.5_0 Service Port 5277 hard-coded credentialsProof-of-Concept
 
Link0.000.00000
09/05/2022$0-$5k$0-$5kcodeprojects Online Driving School login.php sql injectionProof-of-Concept
 
Link0.040.00885CVE-2022-3130
09/05/2022$0-$5k$0-$5kcodeprojects Online Driving School registration.php unrestricted uploadProof-of-Concept
 
Link0.040.00885CVE-2022-3129
09/05/2022$0-$5k$0-$5kSourceCodester Clinics Patient Management System medicine_details.php sql injectionProof-of-Concept
 
Link0.160.00885CVE-2022-3122
09/04/2022$0-$5k$0-$5kSourceCodester Clinics Patient Management System Login index.php sql injectionProof-of-Concept
 
Link0.040.00885CVE-2022-3120
09/03/2022$0-$5k$0-$5kSourcecodehero ERP System Project processlogin.php sql injectionProof-of-Concept
 
Link0.080.00885CVE-2022-3118
09/03/2022$0-$5k$0-$5kTelos Alliance Omnia MPX Node userDB.json access controlProof-of-Concept
 
Link0.040.01018CVE-2022-36642
09/02/2022$0-$5k$0-$5kSoftlink Oliver v5 Library Server FileServlet information disclosureProof-of-Concept
 
Link0.000.00885CVE-2021-45027
09/01/2022$0-$5k$0-$5kjanobe Online Ordering System login.php sql injectionProof-of-Concept
 
Link0.000.00885CVE-2022-36581

Do you know our Splunk app?

Download it now for free!