Recent 09/21/2022

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product

Aruba ClearPass Policy Manager14
Apple macOS8
SWFTools8
ISC BIND6
AMI Aptio6

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix45
Temporary Fix0
Workaround0
Unavailable0
Not Defined44

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High0
Functional0
Proof-of-Concept0
Unproven0
Not Defined89

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

CVSSv3 Base

≤10
≤20
≤30
≤47
≤513
≤623
≤730
≤87
≤99
≤100

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤30
≤47
≤513
≤628
≤727
≤85
≤99
≤100

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

Exploit 0-day

<1k8
<2k26
<5k25
<10k17
<25k11
<50k2
<100k0
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k26
<2k26
<5k23
<10k12
<25k2
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

CreatedBaseTempVulnerability0dayTodayExpRemCTIEPSSCVE
19:373.53.4Craft CMS BaseElementSelectInput.js cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.060.00885CVE-2022-37246
19:376.36.0Erlang OTP Client Authentication improper authentication$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00954CVE-2022-37026
19:356.46.3Çekino Bilgi Teknolojileri Identity and Directory Management System path traversal$0-$5k$0-$5kNot DefinedOfficial Fix0.050.00885CVE-2022-2265
19:343.83.8Rapid7 InsightVM Login Panel information disclosure$0-$5k$0-$5kNot DefinedNot Defined0.070.00885CVE-2019-5641
19:334.34.3XPDF FoFiType1C.cc null pointer dereference$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2022-38928
19:334.64.5pimcore cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.060.00885CVE-2022-3255
19:325.35.2OctoPrint privileges management$0-$5k$0-$5kNot DefinedOfficial Fix0.090.00885CVE-2022-3068
19:304.04.0OctoPrint Session Cookie session expiration$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-2888
15:175.35.1ISC BIND Resolver denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.01769CVE-2022-3080
15:164.74.5ISC BIND Statistics Channel buffer overflow$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-2881
15:145.55.3octoprint unrestricted upload$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-2872
15:135.35.1ISC BIND DNS Resolution Service denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.190.01769CVE-2022-2795
15:105.35.1ISC BIND memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.01769CVE-2022-38178
15:095.35.1ISC BIND ECDSA Signature memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.01769CVE-2022-38177
15:075.35.1ISC BIND named resource consumption$5k-$25k$0-$5kNot DefinedOfficial Fix0.070.00885CVE-2022-2906
12:435.55.5md2roff Markdown File stack-based overflow$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2022-41220
12:427.37.0Database Software Accreditation Tracking/Presentation sql injection$0-$5k$0-$5kNot DefinedOfficial Fix0.060.00885CVE-2022-2315
12:417.37.0Parantez Teknoloji KOHA sql injection$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-0495
12:404.94.7Apache Airflow confirm redirect$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-40754
12:393.53.4Apache Airflow URL information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00885CVE-2022-40604
12:396.36.0Linux Kernel TLB mremap.c use after free$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00950CVE-2022-41222
12:385.04.8Linux Kernel dmxdev.c dvb_dmxdev_release use after free$5k-$25k$0-$5kNot DefinedOfficial Fix0.070.01669CVE-2022-41218
10:355.35.1Apple macOS Privacy Preferences access control$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-32882
10:345.35.1Apple macOS access control$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-32880
10:345.35.1Apple macOS Privacy Preferences access control$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00890CVE-2022-32854
10:336.36.1JFinal CMS sql injection$0-$5k$0-$5kNot DefinedNot Defined0.040.00885CVE-2022-37205
10:325.85.8TIBCO Spotfire Analytics Platform for AWS Marketplace Web Player server-side request forgery$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2022-30579
10:316.46.3McWebserver HTTP Request path traversal$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-39221
10:305.25.1SFTPGo WebClient cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.040.01055CVE-2022-39220
10:253.53.5Huawei CV81-WDM denial of service$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2022-37395
10:244.34.1Apple macOS IP Address information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-32861
10:244.34.1Apple Safari IP Address information disclosure$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-32861
10:245.55.3Apple macOS sandbox$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-26696
09:454.34.3Aruba ClearPass Policy Manager Web-based Management Interface cross-site request forgery$0-$5k$0-$5kNot DefinedNot Defined0.030.01055CVE-2022-23685
09:445.05.0Huawei WS7200-10 Privilege Escalation$5k-$25k$5k-$25kNot DefinedNot Defined0.030.00885CVE-2021-46835
09:435.55.5stealjs babel.js prototype pollution$0-$5k$0-$5kNot DefinedNot Defined0.050.00954CVE-2022-37265
09:423.53.5stealjs babel.js incorrect regex$0-$5k$0-$5kNot DefinedNot Defined0.060.00954CVE-2022-37259
09:364.34.3SmokePing ebuild denial of service$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2017-20147
09:194.34.3Huawei 576up005 HOTA-CM-H-Shark-BD Headset out-of-bounds write$0-$5k$0-$5kNot DefinedNot Defined0.040.00885CVE-2020-36602
09:176.36.3SmartVista SVFE2 mcc_group.jsf sql injection$0-$5k$0-$5kNot DefinedNot Defined0.020.00954CVE-2022-38619
09:135.85.7Grafana Proxy authentication spoofing$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-35957
09:136.46.3JS Compute Runtime for Fastly WebAssembly Module prng seed$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-39218
08:446.36.3Baijia CMS URL Parameter fetch_net_file_upload server-side request forgery$0-$5k$0-$5kNot DefinedNot Defined0.040.01055CVE-2022-38931
08:424.34.3Aruba ClearPass Policy Manager Guest User Interface denial of service$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2022-37884
08:418.88.8Aruba ClearPass Policy Manager OnGuard Agent Privilege Escalation$0-$5k$5k-$25kNot DefinedNot Defined0.060.01036CVE-2022-37877
08:386.36.0Apple macOS Web memory corruption$5k-$25k$5k-$25kNot DefinedOfficial Fix0.030.01440CVE-2022-32863
08:386.36.0Apple Safari Web memory corruption$25k-$100k$5k-$25kNot DefinedOfficial Fix0.040.01440CVE-2022-32863
08:376.36.0Apple macOS File Remote Code Execution$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.02107CVE-2022-32802
08:376.36.3Aruba ClearPass Policy Manager Web-based Management Interface sql injection$0-$5k$5k-$25kNot DefinedNot Defined0.030.01055CVE-2022-23696
08:356.36.3Aruba ClearPass Policy Manager Web-based Management Interface sql injection$0-$5k$5k-$25kNot DefinedNot Defined0.030.01055CVE-2022-23695

39 more entries are not shown

Do you know our Splunk app?

Download it now for free!