Live Recent

Timeframe: 12/04/2020 10:48 PM - 12/05/2020 10:48 PM (13 Entries)
Next Refresh: 12/05/2020 11:48 PM

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

🔴 CTI Activities »

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

CreatedStatus VulnerabilityBase0dayExpRemCTICVE
09:18 PMapproved
100%
National Instruments CompactRIO Driver permission assignment5.3$0-$5kNot DefinedOfficial Fix1.33+CVE-2020-25191
10:23 AMapproved
100%
Kaspersky Anti-Ransomware Tool uncontrolled search path6.3$0-$5kNot DefinedOfficial Fix2.75-CVE-2020-28950
10:22 AMapproved
100%
ImageMagick statistic.c integer overflow5.5$0-$5kNot DefinedOfficial Fix2.11-CVE-2020-27776
10:21 AMapproved
100%
ImageMagick quantum.h integer overflow5.5$0-$5kNot DefinedOfficial Fix1.97-CVE-2020-27775
10:21 AMapproved
100%
ImageMagick statistic.c integer overflow5.5$0-$5kNot DefinedOfficial Fix2.07-CVE-2020-27774
10:20 AMapproved
100%
ImageMagick gem-private.h divide by zero3.5$0-$5kNot DefinedOfficial Fix1.97-CVE-2020-27773
10:20 AMapproved
100%
ImageMagick bmp.c integer overflow5.5$0-$5kNot DefinedOfficial Fix1.82-CVE-2020-27772
10:56 PMapproved
100%
Moddable SDK xsSyntaxical.c:3419 xObjectBindingFromExpression denial of service4.3$0-$5kNot DefinedOfficial Fix4.62-CVE-2020-25465
10:55 PMapproved
100%
Moddable SDK xsDebug.c heap-based buffer overflow6.3$0-$5kNot DefinedOfficial Fix3.15-CVE-2020-25464
10:54 PMapproved
100%
Moddable SDK xsCommon.c fxUTF8Decode denial of service4.3$0-$5kNot DefinedOfficial Fix3.05-CVE-2020-25463
10:54 PMapproved
100%
Moddable SDK xsSyntaxical.c fxCheckArrowFunction heap-based buffer overflow6.3$0-$5kNot DefinedOfficial Fix3.98-CVE-2020-25462
10:51 PMapproved
100%
Moddable SDK xsProxy.c fxProxyGetter denial of service4.3$0-$5kNot DefinedOfficial Fix2.94-CVE-2020-25461
10:49 PMapproved
100%
Arachnys Cabot Address Column cross site scripting3.5$0-$5kProof-of-ConceptNot Defined3.94-CVE-2020-25449

Interested in the pricing of exploits?

See the underground prices here!