Testing Software Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product

IBM Rational Quality Manager82
IBM Rational Collaborative Lifecycle Management42
Oracle Application Testing Suite35
IBM Rational DOORS Next Generation13
IBM Rational Team Concert13

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix64
Temporary Fix0
Workaround0
Unavailable0
Not Defined80

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High0
Functional0
Proof-of-Concept3
Unproven0
Not Defined141

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical0
Local4
Adjacent5
Network135

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High1
Low96
None47

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required84
None60

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤32
≤47
≤566
≤615
≤718
≤814
≤99
≤1013

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤32
≤47
≤566
≤624
≤712
≤812
≤911
≤1010

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤20
≤32
≤462
≤514
≤614
≤715
≤815
≤911
≤1011

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤31
≤41
≤54
≤674
≤711
≤811
≤99
≤1013

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤94
≤100

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤61
≤77
≤86
≤92
≤106

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k5
<2k7
<5k66
<10k31
<25k22
<50k6
<100k3
≥100k4

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k44
<2k17
<5k72
<10k4
<25k7
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (27): CLIF Performance Testing Plugin, Dr Trust USA iCheck Connect BP Monitor BP Testing 118, Extensive Testing Plugin, Hillrom Welch Allyn Connex Cardio, Hillrom Welch Allyn Diagnostic Cardiology Suite, Hillrom Welch Allyn H-Scribe Holter Analysis System, Hillrom Welch Allyn Q-Stress Cardiac Stress Testing System, Hillrom Welch Allyn R-Scribe Resting ECG System, Hillrom Welch Allyn Vision Express, Hillrom Welch Allyn X-Scribe Cardiac Stress Testing System, HP Unified Functional Testing, IBM Collaborative Lifecycle Management, IBM Rational Collaborative Lifecycle Management, IBM Rational DOORS Next Generation, IBM Rational Engineering Lifecycle Manager, IBM Rational Quality Manager, IBM Rational Rhapsody Design Manager, IBM Rational Software Architect, IBM Rational Software Architect Design Manager, IBM Rational Team Concert, nelio-ab-testing Plugin, Oracle Application Testing Suite, Oracle Utilities Testing Accelerator, PHPGurukul COVID19 Testing Management System, SoapUI Pro Functional Testing Plugin, Sourcecodester COVID 19 Testing Management System, xd-testing

PublishedBaseTempVulnerabilityProductExpRemCTICVE
07/27/20225.55.5CLIF Performance Testing Plugin Controller File System path traversalCLIF Performance Testing PluginNot DefinedNot Defined0.49CVE-2022-36894
07/19/20227.57.2Oracle Application Testing Suite Load Testing for Web Apps unknown vulnerabilityApplication Testing SuiteNot DefinedOfficial Fix0.00CVE-2020-5258
04/19/20229.89.6Oracle Application Testing Suite Load Testing for Web Apps xml external entity referenceApplication Testing SuiteNot DefinedOfficial Fix0.08CVE-2018-1285
04/07/20226.36.3Dr Trust USA iCheck Connect BP Monitor BP Testing 118 improper authenticationUSA iCheck Connect BP Monitor BP Testing 118Not DefinedNot Defined0.04CVE-2020-27376
04/07/20226.36.3Dr Trust USA iCheck Connect BP Monitor BP Testing 118 BP Monitoring authentication replayUSA iCheck Connect BP Monitor BP Testing 118Not DefinedNot Defined0.03CVE-2020-27374
04/07/20222.92.9Dr Trust USA iCheck Connect BP Monitor BP Testing 118 Bluetooth LE cleartext transmissionUSA iCheck Connect BP Monitor BP Testing 118Not DefinedNot Defined0.00CVE-2020-27373
04/07/20225.55.5Dr Trust USA iCheck Connect BP Monitor BP Testing 118 Privilege EscalationUSA iCheck Connect BP Monitor BP Testing 118Not DefinedNot Defined0.04CVE-2020-27375
01/21/20226.36.1Sourcecodester COVID 19 Testing Management System sql injectionCOVID 19 Testing Management SystemNot DefinedNot Defined0.03CVE-2021-44245
12/16/20218.18.1Hillrom Welch Allyn Q-Stress Cardiac Stress Testing System SSO authentication bypassWelch Allyn Q-Stress Cardiac Stress Testing System/Welch Allyn X-Scribe Cardiac Stress Testing System/Welch Allyn Diagnostic Cardiology Suite/Welch Allyn Vision Express/Welch Allyn H-Scribe Holter Analysis System/Welch Allyn R-Scribe Resting ECG System/Welch Allyn Connex CardioNot DefinedNot Defined0.03CVE-2021-43935
10/19/20217.57.3Oracle Application Testing Suite jackson-databind xml external entity referenceApplication Testing SuiteNot DefinedOfficial Fix0.00CVE-2020-25649
07/20/20217.37.0Oracle Application Testing Suite Apache Commons BeanUtils deserializationApplication Testing SuiteNot DefinedOfficial Fix0.06CVE-2019-10086
05/27/20213.53.3PHPGurukul COVID19 Testing Management System Parameter cross site scriptingCOVID19 Testing Management SystemProof-of-ConceptNot Defined0.04CVE-2021-33469
05/27/20216.36.0PHPGurukul COVID19 Testing Management System Admin Panel sql injectionCOVID19 Testing Management SystemProof-of-ConceptNot Defined0.00CVE-2021-33470
04/21/20218.88.4Oracle Application Testing Suite Load Testing for Web Apps buffer overflowApplication Testing SuiteNot DefinedOfficial Fix0.07CVE-2019-5064
01/20/20216.15.8Oracle Application Testing Suite Load Testing for Web Apps cross site scriptingApplication Testing SuiteNot DefinedOfficial Fix0.03CVE-2020-11022
01/20/20219.89.4Oracle Application Testing Suite Load Testing for Web Apps xml external entity referenceApplication Testing SuiteNot DefinedOfficial Fix0.05CVE-2020-10683
01/19/20214.84.7Oracle Utilities Testing Accelerator Tools path traversalUtilities Testing AcceleratorNot DefinedOfficial Fix0.04CVE-2021-29425
01/19/20215.35.2Oracle Utilities Testing Accelerator Tools request smugglingUtilities Testing AcceleratorNot DefinedOfficial Fix0.04CVE-2021-33037
01/19/20215.55.4Oracle Utilities Testing Accelerator Tools denial of serviceUtilities Testing AcceleratorNot DefinedOfficial Fix0.03CVE-2021-36374
01/19/20217.57.3Oracle Utilities Testing Accelerator Tools deserializationUtilities Testing AcceleratorNot DefinedOfficial Fix0.06CVE-2021-4104
01/19/20217.57.3Oracle Utilities Testing Accelerator Tools denial of serviceUtilities Testing AcceleratorNot DefinedOfficial Fix0.07CVE-2021-36090
01/19/20217.87.6Oracle Utilities Testing Accelerator Tools privileges managementUtilities Testing AcceleratorNot DefinedOfficial Fix0.02CVE-2021-22118
01/19/20218.38.1Oracle Utilities Testing Accelerator Tools Remote Code ExecutionUtilities Testing AcceleratorNot DefinedOfficial Fix0.03CVE-2021-2351
01/19/20218.78.6Oracle Utilities Testing Accelerator Tools deserializationUtilities Testing AcceleratorNot DefinedOfficial Fix0.05CVE-2021-39139
01/19/20218.88.6Oracle Utilities Testing Accelerator Tools Privilege EscalationUtilities Testing AcceleratorNot DefinedOfficial Fix0.03CVE-2020-13936

119 more entries are not shown

Do you want to use VulDB in your project?

Use the official API to access entries easily!