Newly Added (14)
- MS.SharePoint.Workflows.XOML.Remote.Code.Injection
- Axis.SSI.camnbr.Remote.Command.Execution
- TerraMaster.TOS.User.Creation.System.Command.Injection
- Netsweeper.Webadmin.Unixlogin.Command.Injection
- MS.IE.VBScript.Engine.SafeArrayDestroy.Remote.Code.Execution
- MS.IE.JScript.Engine.JsObjPropertyIsEnumerable.Use.After.Free
- MS.IE.VBScript.Engine.RegExp.Replace.Handling.Use.After.Free
- MS.Graphics.Components.CVE-2020-1153.Remote.Code.Execution
- MS.IE.VBScript.Engine.SafeArrayLock.Use.After.Free
- MS.Windows.CVE-2020-1135.Privilege.Elevation
- MS.Windows.CVE-2020-1143.Privilege.Elevation
- MS.Windows.CVE-2020-1054.Privilege.Elevation
- FG-VD-20-060_Fooplugins.0day
- FG-VD-20-063_WPFormsLite.0day
Modified (5)
- Adobe.Reader.CVE-2020-3804.Information.Disclosure
- LibreNMS.addhost.Authentication.Remote.Command.Injection
- MS.Adobe.Font.Driver.VToHOrigin.Remote.Code.Execution
- Generic.JavaScript.Cryptocurrency.Mining.Script
- MS.Windows.Media.Foundation.mfasfsrcsnk.dll.Type.Confusion
Attr (9)
- GrandSoft.Exploit.Kit
- Fallout.Exploit.Kit
- Spelevo.Exploit.Kit
- FG-VD-19-040_Plex.Web.Client.0day
- Sweetscape.010.Editor.CtrlA.Memory.Corruption
- Apple.WebKit.WebCore.FormSubmission.Create.Use.After.Free
- VMware.vCenter.VmDirLegacyAccessCheck.Authentication.Bypass
- Apple.WebKit.WebCore.RenderObj.PreviousSibling.Use.After.Free
- Cisco.SD-WAN.Solution.vManage.SQL.Injection