Newly Added (7)
- IoTroop.Botnet
- Nagios.XI.Configwizards.Switch.inc.php.Command.Injection
- Satori.botnet
- Apache.Pulsar.JSON.Web.Token.Authentication.Bypass
- Envoy.HTTP.URL.Path.Access.Control.Bypass
- Ivanti.Avalanche.ImageFilePath.Directory.Traversal
- GoScanSSH.botnet
Modified (18)
- MS.IE.DDHTML.Object.Race.Condition.Memory.Corruption
- MS.IE.Visual.Basic.6.ActiveX.Control.Access
- MS.IE.Install.Engine.ActiveX.Buffer.Overflow
- MS.IE.Speech.Engine.ActiveX.Buffer.Overflow
- HP.IMC.dbman.Logging.Buffer.Overflow
- MS.Windows.ShellExecute.URL.Handling.Code.Execution
- MS.IE.url.dll.Telnet.Handler.Insecure.EXE.Loading
- Malicious.Shellcode.Detection
- MS.Windows.Vector.Markup.Language.Code.Execution
- MS.IE.Implicit.Drag.And.Drop.File.Installation
- MS.GDI.WMF.META.DIB.Heap.Overflow
- MS.Windows.GDI.ICO.File.DoS
- MS.GDI+.VML.Gradient.Code.Execution
- MS.Windows.CreateSizedDIBSECTION.Thumbnail.View.Stack.Overflow
- MS.Windows.Image.Color.Management.System.Heap.Overflow
- Bazaloader.Botnet
- Kinetica.Admin.getLogs.Function.Remote.OS.Command.Execution
- Netgear.PS.NMS300.MFileUploadController.Arbitrary.File.Upload
Removed (13)
- MS.IE.Install.Engine.ActiveX.Control.Buffer.Overflow
- MS.IE.COM.Object.Instantiation.Memory.Corruption
- MS.IE.DHTML.Object.Memory.Corruption
- MS.IE.DHTML.Object.Model.Race.Condition.Memory.Corruption
- MS.Windows.Image.Color.Management.System.Code.Execution
- MS.GDI.WMF.META.DIB.Integer.Overflow
- MS.Windows.ShellExecute.URL.Parsing.Code.Execution
- MS.IE.Memory.Corruption
- MS.GDI+.VML.Gradient.Memory.Corruption
- MS.XMLHTTP.ActiveX.Control.Remote.Code.Execution
- MS.XML.Core.Service.XMLHTTP.ActiveX.Code.Execution
- HP.IMC.dbman.Logging.Remote.Buffer.Overflow
- Apple.Mail.X.Unix.Mode.Executable.Mail.Attachment