Newly Added (8)
- AWS.FreeRTOS.UDP.Buffer.Overflow
- CMS.Made.Simple.Module.Import.PHP.Remote.Command.Injection
- Hacker.Tools.Dr.Hex
- 10-Strike.LANState.Local.Buffer.Overflow.Exploit
- Java.JMX.Insecure.Endpoints.Remote.Access
- FG-VD-18-164_WordPress.0day
- FG-VD-18-165_WordPress.0day
- MS.Windows.WER.Arbitrary.File.Overwrite
Modified (44)
- MS.IE.CVE-2018-8631.Memory.Corruption
- LibreOffice.rtf.File.Handling.Memory.Corruption
- MS.COM.Validation.Remote.Code.Execution
- MS.Office.Word.CVE-2018-8157.Memory.Corruption
- MS.Word.RTF.Drawing.Object.Integer.Overflow
- MS.Office.pictim32.JPEG.Memory.Corruption
- MS.Office.RTF.Bitmap.Object.Memory.Corruption
- MS.Word.Malformed.RTF.Parsing.Code.Execution
- MS.Office.RTF.Control.TaskSymbol.Remote.Code.Execution
- MS.Windows.phoneinfo.DLL.Loading.Remote.Code.Execution
- Advantech.Webaccess.webvrpcs.Directory.Traversal
- MS.Office.RTF.Double.Free.Remote.Code.Execution
- MS.Office.2010.Remote.Download.Execution
- MS.Word.RTF.Parsing.Buffer.Overflow
- MS.WordPad.Embedded.COM.Code.Execution
- MS.Office.RTF.gridtbl.Handling.Memory.Corruption
- MS.Office.Word.CVE-2017-11854.Memory.Corruption
- MS.Office.RTF.Memory.Corruption
- MS.RTF.Object.Package.Download.Attempt
- Microsoft.Office.DDE.Field.Code.Execution
- MS.Windows.RTF.DLL.Loading.Remote.Code.Execution
- MS.Office.RTF.Mismatch.Remote.Code.Execution
- Adobe.Acrobat.CVE-2018-16042.Security.Bypass
- MS.Office.RTF.Array.Out.of.bounds.Memory.Corruption
- MS.Office.wwlib.dll.RTF.File.Information.Disclosure
- MS.Office.RTF.Drawing.Objects.Memory.Corruption
- MS.Office.PTLS7.RTF.Handling.Memory.Corruption
- Oracle.Data.Quality.Multiple.Type.Confusion
- MS.Word.Listid.Code.Execution
- MS.Windows.Graphics.Component.EMF.Information.Disclosure
- MS.Word.RTF.Listoverridecount.Remote.Code.Execution
- MS.Office.RTF.File.OLE.autolink.Code.Execution
- Icecast.Server.auth_url.Stack.Buffer.Overflow
- MS.Windows.winrt.DLL.Loading.Remote.Code.Execution
- MS.Office.Word.Uninitialize.Heap.RTF.Memory.Corruption
- MS.Office.Word.RTF.dpgroup.Out.Of.Bound.Memory.Corruption
- MS.Office.RTF.wwlib.dll.Memory.Corruption
- MS.Office.EQNEDT32.EXE.Equation.Parsing.Memory.Corruption
- MS.Office.COMSVCS.Dll.Hijacking
- WIFICAM.P2P.GoAhead.Multiple.Remote.Code.Execution
- MS.Word.RTF.Stylesheet.Parsing.Code.Execution
- MS.Word.RTF.Stack.Exhaustion.DoS
- MS.Word.RTF.Memory.Corruption
- MS.Office.RTF.Dpgroup.Memory.Corruption
Attr (20)
- Cisco.Adaptive.Security.Appliance.SIP.Handling.DoS
- Xiaomi.Mi.Router.3.wifi_access.Functionality.Command.Injection
- Xiaomi.Mi.Router.3.request_mitv.Command.Injection
- TeamCity.Agent.XML.RPC.Command.Execution
- D-Link.DIR-816.Command.Injection
- Opsview.Monitor.NetAudit.Command.Injection
- PHP.imap_open.Function.Remote.Code.Execution
- Adobe.Flash.Player.CVE-2018-15983.Insecure.DLL.Loading
- MS.Edge.Chakra.Scripting.Engine.CVE-2018-8583.Memory.Corruption
- MS.Outlook.CVE-2018-8587.Remote.Code.Execution
- MS.Windows.Kernel.CVE-2018-8611.Memory.Corruption
- MS.Scripting.Engine.CVE-2018-8617.Memory.Corruption
- MS.Windows.Win32k.CVE-2018-8639.Privilege.Elevation
- MS.IE.Scripting.Engine.CVE-2018-8643.Memory.Corruption
- MS.IE.MSXML.xsl.VBscript.Execution.Policy.Bypass
- MS.Edge.CVE-2018-8634.Remote.Code.Execution
- MS.PowerPoint.CVE-2018-8628.Memory.Corruption
- MS.Edge.Chakra.CVE-2018-8624.Out.of.Bounds.Access
- MS.Edge.Chakra.Engine.CVE-2018-8629.Memory.Corruption
- MS.IE.VBScript.CVE-2018-8625.Memory.Corruption