0.00228
Newly Added (6)A signature to prevent attackers from taking over user accounts through backdoor in NUUO's NVRMini2 3.8.0 (CVE-2018-1150).A signature to prevent attackers from downloading Maitra Mail...
View Article0.00229
Newly Added (6)A signature to prevent attackers from accessing sensitive files in WP Security Audit Log plugin for WordPress (CVE-2018-8719).A signature to prevent attackers from reading arbitrary...
View Article0.00230
Newly Added (6)A signature to prevent attackers from accessing CF Image Hosting Script database.A signature to prevent attackers from accessing sensitive information in Online Trade 1...
View Article0.00231
Newly Added (6)A signature to prevent attackers from scanning Miner Bot.A signature to check whether the request came from Yakuza scanner.A signature to prevent attackers from injecting arbitrary code...
View Article0.00232
Newly Added (6)A signature to prevent attackers from executing arbitrary code through deserialization vulnerability in OpenMRS Platform (CVE-2018-19276).A signature to prevent attackers from injecting...
View Article0.00233
Newly Added (6)A signature to prevent attackers from accessing ReDuh/reGeorg tunnel.A signature to prevent attackers from injecting arbitrary code in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before...
View Article0.00234
Newly Added (5)A signature to prevent attackers from performing Command Injection attacks by using "ipconfig" command.A signature to prevent attackers from performing Command Injection attacks by using...
View Article0.00235
Newly Added (5)A signature to prevent attackers from accessing sensitive files in visual studio.A signature to prevent attackers from accessing sensitive files in IntelliJ IDEA.A signature to prevent...
View Article0.00236
Newly Added (6)A signature to prevent attackers from injecting arbitrary commands in Cisco RV320 (CVE-2019-1652).A signature to prevent attackers from injecting arbitrary PHP code in TeemIp IPAM.A...
View Article0.00237
Newly Added (1)A signature to prevent attackers from executing arbitrary commands in Apache Tomcat when running on Windows (CVE-2019-0232). ]]>
View Article0.00238
Newly Added (6)A signature to prevent attackers from executing arbitrary commands through template injection in Atlassian Confluence Server (CVE-2019-3396).A signature to prevent attackers from...
View Article0.00239
Newly Added (7)A signature to prevent attackers from bypassing WAF protection mechanisms using the x-up-devcap-post-charset Header in ASP.NET.A signature to prevent attackers from uploading arbitrary...
View Article0.00240
Newly Added (6)A signature to prevent attackers from accessing sensitive information in Oracle WebLogic Server component of Oracle Fusion Middleware (CVE-2019-2615).A signature to prevent attackers...
View Article0.00241
Newly Added (6)A signature to prevent attackers from accessing Mangaki database configuration file.A signature to prevent attackers from executing arbitrary commands in LibreNMS (CVE-2018-20434).A...
View Article0.00242
Modified (2)A signature to prevent attackers from executing arbitrary code through wls9-async component deserialization vulnerability in Oracle WebLogic Server (CVE-2019-2725).A signature to prevent...
View Article0.00243
Newly Added (23)A signature to prevent attackers from uploading arbitrary files in BlogEngine.NET.A signature to prevent attackers from downloading arbitrary files using directory traversal...
View Article0.00244
Newly Added (14)A signature to prevent attackers from executing arbitrary commands in Nagios XI (CVE-2018-15708, CVE-2018-15710).A signature to prevent attackers from downloading arbitrary files using...
View Article0.00245
Newly Added (25)A signature to prevent attackers from executing arbitrary codes in Wordpress Ad Inserter with minimal privileges.A signature to prevent attackers from exploiting a Denial Of Service...
View Article0.00246
Newly Added (24)A signature to prevent attackers from executing arbitrary code through deserialization vulnerability in Apache Solr (CVE-2019-0192).A signature to prevent attackers from exploiting a...
View Article