Search : 227033 résultats
8.8 CVE-2023-38396
Cross-Site Request Forgery (CSRF) vulnerability in Alain Gonzalez plugin <= 3.1.2 versions.
8.8 CVE-2023-38390
Cross-Site Request Forgery (CSRF) vulnerability in Anshul Labs Mobile Address Bar Changer plugin <= 3.0...
8.8 CVE-2023-37990
Cross-Site Request Forgery (CSRF) vulnerability in Mike Perelink Pro plugin <= 2.1.4 versions....
8.8 CVE-2023-25463
Cross-Site Request Forgery (CSRF) vulnerability in Gopi Ramasamy WP tell a friend popup form plugin...
9.8 CVE-2022-47893
There is a remote code execution vulnerability that affects all versions of NetMan 204. A remote attacker...
7.5 CVE-2022-47892
All versions of NetMan 204 could allow an unauthenticated remote attacker to read a file (config.cgi)...
8.8 CVE-2022-47891
All versions of NetMan 204 allow an attacker that knows the MAC and serial number of the device to reset...
9.8 CVE-2023-24855
Memory corruption in Modem while processing security related configuration before AS Security Exchange....
7.8 CVE-2023-24853
Memory Corruption in HLOS while registering for key provisioning notify.
5.5 CVE-2023-28571
Information disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan....
7.8 CVE-2023-28539
Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command.
8.8 CVE-2023-37998
Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler plugin <= 3.0.3 versions.
What is the Sherlock® KB project?
First of all KB for "Knowledge Base". The company ProHacktive is making its database of known vulnerabilities to date available for free. This database combines Nist's CVE database (https://nvd.nist.gov/), the CWE database (https://cwe.mitre.org/) and the CAPEC database (https://capec.mitre.org/).
For what purpose?
ProHacktive's promise is the democratization of the Cybersecurity Audit. For this, it seemed relevant to us to offer our "Knowledge Base" in different languages. Associated with this multilingual database, a clear and concise interface allows you to consult all the CVE ("Common Vulnerabilities and Exposures") present on your network. The Sherlock® service database is updated every hour from the various sources enriching our Sherlock® KB and immediately tested on the devices concerned by the new vulnerability.
Search for vulnerabilities
We also offer a simple search module in the description of each CVE. For the more curious, an advanced search allows you to point precisely to an application, an OS or a hardware. This advanced search is based on the mechanics used in our solution Sherlock®: the permanent Cybersecurity audit accessible financially and technically to all.
Developments?
We will add new languages regularly. A monitoring module will be implemented: you will be able to monitor an application, an OS or a hardware to be alerted of new vulnerabilities concerning it. Subscribe to our mailing list to be alerted when this feature is released (available on search results).