Iij B1 Schwachstellen

Zeitverlauf

Version

2.06
2.16
2.26
2.36
2.46

Massnahmen

Official Fix4
Temporary Fix0
Workaround0
Unavailable0
Not Defined2

Ausnutzbarkeit

High0
Functional0
Proof-of-Concept2
Unproven2
Not Defined2

Zugriffsart

Not Defined0
Physical0
Local0
Adjacent0
Network6

Authentisierung

Not Defined0
High0
Low0
None6

Benutzeraktivität

Not Defined0
Required0
None6

C3BM Index

CVSSv3 Base

≤10
≤20
≤30
≤42
≤50
≤60
≤72
≤80
≤90
≤102

CVSSv3 Temp

≤10
≤20
≤30
≤42
≤50
≤62
≤70
≤80
≤92
≤100

VulDB

≤10
≤20
≤30
≤42
≤50
≤60
≤72
≤80
≤90
≤102

NVD

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

CNA

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Hersteller

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Exploit 0-day

<1k0
<2k2
<5k4
<10k0
<25k0
<50k0
<100k0
≥100k0

Exploit heute

<1k6
<2k0
<5k0
<10k0
<25k0
<50k0
<100k0
≥100k0

Exploitmarktvolumen

🔴 CTI Aktivitäten

Affected Versions (42): 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 2.10, 2.11, 2.12, 2.13, 2.14, 2.15, 2.16, 2.17, 2.18, 2.19, 2.20, 2.21, 2.22, 2.23, 2.24, 2.25, 2.26, 2.27, 2.28, 2.29, 2.30, 2.31, 2.32, 2.33, 2.34, 2.35, 2.36, 2.37, 2.38, 2.39, 2.40, 2.41

weitere Einträge von Iij

Interested in the pricing of exploits?

See the underground prices here!