Newly Added (2)
Modified (8)
- MS.Office.EQNEDT32.EXE.Equation.Parsing.Memory.Corruption
- PHP.Windows.Shell.Escape.Functions.Remote.Command.Execution
- Obfuscated.Rich.Text.Format
- MS.IIS.ISAPI.Extension.Buffer.Overflow
- MS.Office.RTF.File.OLE.autolink.Code.Execution
- 3S-Smart.CODESYS.Web.Server.URI.Stack.Buffer.Overflow
- Fallout.Exploit.Kit
- MS.Windows.WMDMCESP.WMDMCESP.DLL.Loading.Code.Execution
Removed (1)
Attr (20)
- Apple.XNU.icmp_error.Handling.Remote.Code.Execution
- Squid.Proxy.SNMP.Query.Rejection.DoS
- Microsoft.IIS.ShortName.Vulnerability.Scanner
- Adobe.ColdFusion.CKEditor.upload.cfm.Directory.Traversal
- Apache.Spark.Unauthen.Remote.Command.Execution
- WordPress.WP.GDPR.Compliance.Plugin.Privilege.Escalation
- Adobe.Flash.TVSDK.metadata.Use.After.Free
- IBM.WebSphere.MQ.Login.User.ID.Brute.Force.Check
- MS.Scripting.Engine.CVE-2018-8618.Memory.Corruption
- Adobe.Reader.PDF.CVE-2018-19703.Information.Disclosure
- Adobe.Acrobat.CVE-2018-15984.Memory.Corruption
- WordPress.Plugin.Snap.Creek.Duplicator.PHP.Code.Injection
- Unnamed_1989.Botnet
- LG.SuperSign.CMS.Remote.Code.Execution
- Hacker.Tools.Dr.Hex
- Secutech.Ris.Device.Remote.DNS.Change.Policy.Bypass
- Roundcube.Webmail.Attached.HTML.XSS
- Broadcom.UPnP.Stack.SetConnectionType.Function.Format.String
- Hashicorp.Consul.Rexec.Remote.Command.Execution
- Hashicorp.Consul.Services.API.Remote.Command.Execution