Newly Added (3)
- Malware.Sinkhole
- Horde.Groupware.Webmail.OS.generate_email.Command.Injection
- Datalust.Seq.isauthenticationenabled.Authentication.Bypass
Modified (9)
- Adobe.Acrobat.EMF.Bezier.Curves.Out.of.Bounds.Read
- CK.Exploit.Kit
- Delta.Industrial.Automation.AHSIM_5x0.Simulator.Buffer.Overflow
- MS.Office.EQNEDT32.EXE.Equation.Parsing.Memory.Corruption
- Novell.ZAM.FileUploadServlet.Directory.Traversal
- MS.Windows.VBScript.Engine.Class_Terminate.Code.Execution
- Obfuscated.Rich.Text.Format
- bWAPP.Web.Application.Test
- MS.Edge.CVE-2018-0758.Memory.Corruption
Removed (41)
- PALS.CommandExecution
- FreeRADIUS.AscendSendSecret
- Sample.showcode.asp.Disclosure
- DCShop.Orders.txt
- WNewk
- TrendMicro.VirusWall.FtpSave.dll.Access
- Linux.Rlogin.Information.Disclosure
- CYRUS.IMSP.BufferOverflow
- SiteServer.remind.asp.Access
- Worm.PhpInclude
- SpinBox.spin_client.BufferOverflow
- OpenSSH.GOBBLES.Attempt.GOBBLES
- Squirrelmail.Theme
- Project.R3x.Dictionary.Password.Access
- MyDoom.Server
- MS.SQLShell.Code.Execution
- Samba.Smbd.SMBsessetupX.Buffer.Overflow
- Whatsup.Gold
- Admin.Passwd
- ES.One.Store.DirectoryTraversal
- Skype.Buffer.Overflow
- Technote.Print.DirectoryTraversal
- Finger.Dot.Query
- Bagle.2.JPG.GET.PoloBeer
- BSD.Ftpd.Glob.Buffer.Overflow
- Oracle.rwcgi60
- Sambar.cgitest.exe.CommandExecution
- PuTTY.SSHv2.Debug.Msg.BufferOverflow
- OpenCA.pki.Access
- Finger.Account.Enumeration
- OpenCA.scepd.Access
- Shaft.Handler2Agent
- TrackerCam.User-Agent.Buffer.Overflow
- Ad.CGI.RestrictedResource.Access
- SiteServer.uploadx.asp.Access
- MyDoom.Client
- Kore.Exploit.Kit
- Blacole.Exploit.Kit
- FlashPack.Exploit.Kit
- Scanbox.Exploit.Kit
- Hunter.Exploit.Kit