Live Recent

Timeframe: 11/25/2020 01:22 PM - 11/26/2020 01:22 PM (14 Entries)
Next Refresh: 11/26/2020 02:22 PM


The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

🔴 CTI Activities »

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

CreatedStatus VulnerabilityBase0dayExpRemCTICVE
09:34 AMapproved
petl XML Document unknown vulnerability5.5$0-$5kNot DefinedOfficial Fix2.25+CVE-2020-29128
09:33 AMapproved
FactoryTalk Linx Address Space Layout Randomization heap-based buffer overflow7.3$0-$5kNot DefinedNot Defined3.98+CVE-2020-27255
09:32 AMapproved
FactoryTalk Linx Check Routine denial of service5.3$0-$5kNot DefinedNot Defined4.11+CVE-2020-27253
09:23 AMapproved
Rockwell Automation FactoryTalk Linx Port Range heap-based buffer overflow7.3$0-$5kNot DefinedNot Defined4.55+CVE-2020-27251
09:21 AMapproved
spice-vdagentd Client Connection race condition5.5$0-$5kNot DefinedNot Defined4.30CVE-2020-25653
09:20 AMapproved
spice-vdagentd Unix Domain Socket spice-vdagent-sock allocation of resources3.3$0-$5kNot DefinedNot Defined3.46CVE-2020-25652
09:20 AMapproved
spice-vdagent File Transfer race condition5.5$0-$5kNot DefinedNot Defined4.04CVE-2020-25651
06:29 AMapproved
x11vnc shmget Call scan.c access control5.5$0-$5kNot DefinedOfficial Fix4.88CVE-2020-29074
06:23 AMapproved
osCommerce Newsletter cross site scripting3.5$0-$5kNot DefinedNot Defined4.30CVE-2020-29070
06:21 AMapproved
Nanopb Message memory corruption5.3$0-$5kNot DefinedOfficial Fix4.30CVE-2020-26243
06:20 AMapproved
GLPI caldav.php authorization4.3$0-$5kNot DefinedOfficial Fix4.09CVE-2020-26212
06:18 AMapproved
spice-vdagentd File Transfer spice-vdagent-sock allocation of resources5.5$0-$5kNot DefinedNot Defined3.78CVE-2020-25650
06:17 AMapproved
Atlassian Fisheye/Crucible MessageBundleResource denial of service4.3$0-$5kNot DefinedOfficial Fix4.10CVE-2020-14191
06:16 AMapproved
Atlassian Fisheye/Crucible EyeQL incorrect regex4.3$0-$5kNot DefinedOfficial Fix3.91CVE-2020-14190

Interested in the pricing of exploits?

See the underground prices here!