Newly Added (3)
- MS.Windows.ActiveX.Data.Objects.Code.Execution
- Supra.Smart.Cloud.TV.Remote.File.Inclusion
- WordPress.Plugin.Font.Uploader.Remote.PHP.Code.Injection
Modified (7)
- HTTP.URI.SQL.Injection
- TurnkeyWebTools.PHP.Simple.Shop.Multiple.Remote.File.Inclusion
- LAquis.SCADA.Web.Server.relatorioindividual.Command.Injection
- Malicious.VBScript.Obfuscation.Code.Packer.Detection
- Bit.5.Blog.Index.PHP.SQL.Injection
- WMNews.Base.Datapath.Remote.File.Inclusion
- WoW.Roster.subdir.Parameter.Handling.File.Inclusion
Attr (20)
- Adobe.Reader.JSON.Stringify.Use.After.Free
- FG-VD-19-076_Logitech.0day
- FG-VD-19-078_Logitech.0day
- Google.Chrome.ExtensionsGuestViewMessageFilter.DoS
- Joomla.Component.JS.Support.Ticket.CSRF
- Schneider.Electric.Modicon.M580.0x20.Information.Disclosure
- TP-Link.Archer.C9.Admin.Password.Reset
- Netgear.WNDR4700.Authentication.Bypass
- Schneider.Electric.Modicon.M580.0x22.Information.Disclosure
- Schneider.Electric.Modicon.M580.UMAS.0x65.DoS
- Schneider.Electric.Modicon.M580.UMAS.0x20.DoS
- Schneider.Electric.Modicon.M580.0x20.Offset.Out.of.Bounds.Read
- Schneider.Electric.Modicon.M580.Session.Authentication.Bypass
- HP.Intelligent.Management.Deserialization.Remote.Code.Execution
- ThinStation.CGI.Command.Injection
- MS.GDI.EMR_CREATEDIBPATTERNBRUSHPT.Information.Disclosure
- Advantech.WebAccess.SCADA.IOCTL.10012.Stack.Buffer.Overflow
- DiV.CMS.v1.Poll.Multiple.Remote.Code.Injection
- EmbedThis.GoAhead.parseHeaders.Out.of.Bounds.Read
- FG-VD-19-089_Cisco.0day