Recent 09/17/2022

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product

Google TensorFlow59
Huawei EMUI31
Huawei Magic UI23
Huawei HarmonyOS22
Google Chrome6

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix105
Temporary Fix0
Workaround0
Unavailable0
Not Defined17

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High0
Functional0
Proof-of-Concept1
Unproven0
Not Defined121

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

CVSSv3 Base

≤10
≤20
≤30
≤423
≤558
≤618
≤716
≤87
≤90
≤100

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤30
≤423
≤558
≤623
≤711
≤87
≤90
≤100

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k11
<2k10
<5k10
<10k72
<25k13
<50k1
<100k5
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k21
<2k80
<5k14
<10k0
<25k7
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

CreatedBaseTempVulnerability0dayTodayExpRemCTIEPSSCVE
17:005.55.3Google Chrome DevTools input validation$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.01018CVE-2022-3201
16:595.55.3Google Chrome Internals heap-based overflow$25k-$100k$5k-$25kNot DefinedOfficial Fix0.040.01213CVE-2022-3200
16:586.36.0Google Chrome Frames use after free$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.01213CVE-2022-3199
16:586.36.0Google Chrome PDF use after free$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.01213CVE-2022-3198
16:576.36.0Google Chrome PDF use after free$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.01213CVE-2022-3197
16:576.36.0Google Chrome PDF use after free$25k-$100k$5k-$25kNot DefinedOfficial Fix0.050.01213CVE-2022-3196
16:494.84.7Snipe-IT improper authentication$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-3173
11:133.53.5Craft CMS Drafts cross site scripting$0-$5k$0-$5kNot DefinedNot Defined0.000.00885CVE-2022-37251
11:133.53.4Craft CMS fields cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-37247
11:123.53.26Kare Emakin Activity Stream Page setProfile cross site scripting$0-$5k$0-$5kProof-of-ConceptNot Defined0.080.00885CVE-2020-25491
11:123.33.2Nextcloud Android path traversal$0-$5k$0-$5kNot DefinedOfficial Fix0.060.00885CVE-2022-39210
11:117.47.4Tesla Model 3 Mobile App Phone Key Authentication authentication spoofing$0-$5k$0-$5kNot DefinedNot Defined2.100.00954CVE-2022-37709
11:105.55.5Open5GS UPF PFCP Session Establishment Request memcpy potentially dangerous function$0-$5k$0-$5kNot DefinedNot Defined0.060.00885CVE-2022-39063
11:095.75.6some-natalie ghas-to-csv API injection$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-39217
11:083.53.5Samsung mTower TEE_Realloc resource consumption$0-$5k$0-$5kNot DefinedNot Defined0.000.00885CVE-2022-40762
11:083.53.5Samsung mTower TEE_MACUpdate buffer overflow$0-$5k$0-$5kNot DefinedNot Defined0.050.00954CVE-2022-40760
11:073.53.5Samsung mTower TEE_CipherUpdate buffer overflow$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2022-40758
11:074.64.6Samsung mTower TEE_MACComputeFinal buffer overflow$0-$5k$0-$5kNot DefinedNot Defined0.040.00885CVE-2022-40757
11:063.53.5JasPer jas_image.c inttobits denial of service$0-$5k$0-$5kNot DefinedNot Defined0.050.00885CVE-2022-40755
11:056.36.0Zoho ManageEngine Password Manager Pro/PAM360/Access Manager Plus sql injection$0-$5k$0-$5kNot DefinedOfficial Fix0.080.00885CVE-2022-40300
11:046.36.1Watchdog Anti-Virus Binary access control$5k-$25k$5k-$25kNot DefinedNot Defined0.040.01036CVE-2022-38611
11:045.55.5stealjs npm-convert.js convertLater prototype pollution$0-$5k$0-$5kNot DefinedNot Defined0.000.00954CVE-2022-37258
11:047.77.6Zoom On-Premise Meeting Connector MMR access control$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-28758
11:035.55.3Huawei EMUI/HarmonyOS WLAN Module permission$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-39009
11:025.55.3Huawei EMUI/HarmonyOS NFC Module deserialization$5k-$25k$0-$5kNot DefinedOfficial Fix0.050.00885CVE-2022-39008
11:024.34.2Nextcloud Talk Video Frame information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.060.00885CVE-2022-39212
09:255.55.3Huawei EMUI/HarmonyOS Location Module access control$5k-$25k$0-$5kNot DefinedOfficial Fix0.070.00885CVE-2022-39007
09:244.84.6Huawei EMUI/Magic UI/HarmonyOS MPTCP Module race condition$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-39006
09:243.53.4Huawei EMUI/Magic UI/HarmonyOS MPTCP Module memory leak$0-$5k$0-$5kNot DefinedOfficial Fix0.080.00885CVE-2022-39005
09:243.53.4Huawei EMUI/Magic UI/HarmonyOS MPTCP Module memory leak$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-39004
09:235.55.3Huawei EMUI/Magic UI Video Framework buffer overflow$5k-$25k$0-$5kNot DefinedOfficial Fix0.050.00885CVE-2022-39003
09:235.55.3Huawei EMUI/Magic UI Storage Module double free$5k-$25k$0-$5kNot DefinedOfficial Fix0.080.00885CVE-2022-39002
09:225.55.3Huawei EMUI/Magic UI/HarmonyOS iAware Module access control$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-39000
09:225.55.3Huawei EMUI/HarmonyOS AOD Module Privilege Escalation$5k-$25k$0-$5kNot DefinedOfficial Fix0.080.00885CVE-2022-38999
09:216.46.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-38997
09:217.57.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38996
09:207.57.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.080.00885CVE-2022-38995
09:206.46.3Huawei EMUI/Magic UI/HarmonyOS secure OS module information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38994
09:196.46.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38993
09:196.46.3Huawei EMUI/Magic UI/HarmonyOS secure OS module information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38992
09:185.35.1Huawei EMUI/Magic UI/HarmonyOS Secure OS Module information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38991
09:187.57.3Huawei EMUI/Magic UI/HarmonyOS secure OS module denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.050.00885CVE-2022-38990
09:187.57.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38989
09:176.46.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38988
09:177.57.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38987
09:166.46.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38979
09:156.46.3Huawei EMUI/Magic UI/HarmonyOS Secure OS Module information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-38978
09:143.53.4Huawei EMUI Configuration information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2021-40023
09:143.53.4Huawei EMUI/Magic UI HW_KEYMASTER Module out-of-bounds$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2021-40019
09:133.53.4Huawei HarmonyOS HW_KEYMASTER Module out-of-bounds$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2021-40017

72 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!