Research Article
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter
Table 1
Vulnerability information about exploits.
| CVE number | Vulnerability name | Software version |
| CVE-2018-9131 | Reaper buffer error vulnerability | Reaper 5.78 | CVE-2018-6481 | Flexense Disk Savvy enterprise buffer error vulnerability | Flexense Disk Savvy enterprise 10.4.18 | CVE-2017-14627 | CyberLink LabelPrint buffer error vulnerability | CyberLink LabelPrint 2.5 | CVE-2017-8869 | MediaCoder buffer error vulnerability | MediaCoder 0.8.48.5888 | CVE-2017-8870 | AudioCoder buffer error vulnerability | AudioCoder 0.8.46 |
|
|