KingSoft Web Shield versions 1.1.0.62 and below suffer from cross site scripting and code execution vulnerabilities.
78a251018074ef1e84e4ecf3cd26711fbb95dbaaddbd29e314c728b55dfe9914
WordPress Shield Security plugin versions 20.0.5 and below cross site scripting exploit that adds an administrative user.
705e2276f9150db10c6e5b1e68e86831e4cde8ecf32c63988f9cecbbcc2e80d0
WordPress Shield Security Smart Bot Blocking and Intrusion Prevention plugin versions 17.0.17 and below suffer from cross site scripting and missing authorization vulnerabilities.
358b29ae547e818a56ed1efd1c28b8c8cf64813a62a0dcf419a7cb3364a65748
The Canadian Internet Registration Authority (CIRA) Canadian Shield iOS application versions 4.0.12 and below do not validate the SSL certificate it receives when connecting to the application server.
45101c457e72359c021a13cf5308d10f34eba950e27a433202de650671c113b1
Shield CMS version 2.2 suffers from cross site request forgery and remote SQL injection vulnerabilities.
923d83c434210c09caff9748946a695969ae091f5fcb8459e584caa7673c5340
Ecessa ShieldLink SL175EHQ version 10.7.4 suffers from an add superuser cross site request forgery vulnerability.
5cc4b074d5af1b150d7925eb5d77aa54a0146fc3c23b9644b4d72c74d23cc8aa
System Shield version 5.0.0.136 suffers from a privilege escalation vulnerability.
f626a4f9552099668be23ebb87041f750ded49c5680a8ffbd4970f638156b4aa
DBShield version 1.0.0 Beta 4 is a database firewall that protects the system by inspecting incoming queries from your application server and rejecting abnormal ones.
6dab3c16e409dbc9a4f9384d02237f33f7ec7b6d6c32cbccc725ce7535c8bed9
Hotspot Shield version 6.0.3 suffers from an unquoted service path privilege escalation vulnerability.
711e67e425ec3861788f113f36618c50d4ca9bed727595d279f41e1f555726a1
Red Hat Security Advisory 2016-1836-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: A flaw was found in Kibana's logging functionality. If custom logging output was configured in Kibana, private user data could be written to the Kibana log files. A system attacker could use this data to hijack sessions of other users when using Kibana behind some form of authentication such as Shield.
0707fa05cbabbda32d9417ca3c7d1ad826c785569599239061545b5214dcff10
Hotspot Shield suffers from a dll hijacking vulnerability.
734e59498529f65dd47e43719644d5b17369a52c20a7f1c17a1f20a1aa204c6b
InstallShield suffers from a DLL hijacking vulnerability.
4c5735bf0c7180106c89369ae626f03213246d7d0d90f51d7b872e835b3c3bf3
Secunia Security Advisory - Multiple vulnerabilities have been reported in InstallShield and AdminStudio, which can be exploited by malicious people to compromise a user's system.
fd0612b437694ece30e881b572904f9e50cb203814c60fa424d06b4fb8be83f3
This document specifies a mechanism that can be implemented in layer-2 devices to mitigate attack vectors based on Neighbor Discovery messages. It is meant to complement other mechanisms implemented in layer-2 devices such as Router Advertisement Guard (RA-Guard) and DHCPv6-Shield, with the goal of achieving a comprehensive IPv6 First Hop Security solution. This document is motivated by the desire to achieve feature parity with IPv4 with respect to First Hop Security mechanisms.
b0bd48d4dfcf7fc338169df812038a282998457c61b3f8cfb9294a669b43f80a
Secunia Security Advisory - A vulnerability has been reported in VMWare vShield Manager, which can be exploited by malicious people to conduct cross-site request forgery attacks.
d01088689d2875c0b2283e87af6571fa1c8343392172319bd631d5c43c25afa6
VMware Security Advisory 2012-0005 - VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, ESXi and ESX address several security issues
ccad2214677a724db3237cf961a90dec1de316a2a31f07ed2cbeab3610a575e0
Secunia Security Advisory - A vulnerability has been reported in McAfee GroupShield, which can be exploited by malicious people to compromise a vulnerable system.
876f4bb8ae3bf2f67af7307c58334a25a189210a53cf2affc44a78fef342f852
Zero Day Initiative Advisory 11-319 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within \Program Files\Common Files\InstallShield\ISGrid2.dll. If the bstrReplaceText parameter exceeds its statically-allocated length then a buffer overflow will occur. This can be exploited to execute arbitrary code on the system in the context of the user running the browser.
3eacac84513b91a50fb4fc056becf5fa6d034716f1cc6215002d8ad0fd4f0d3f
Secunia Security Advisory - A vulnerability has been reported in McAfee GroupShield, which can be exploited by malicious people to compromise a vulnerable system.
aa752efbe0432eca848bef9a70ed6d4feeb4629518734d64388d7abf7e6130be
pam_shield is a PAM module that uses null-routing or iptables to lock out script kiddies that probe your computer for open logins or easy guessable passwords. pam_shield is meant as an aid to protect public computers on the Internet.
30593cbebd37bd26ba4c311caa7743df1fe19e4900f64d0cfe1380424f07d719
pam_shield is a PAM module that uses null-routing or iptables to lock out script kiddies that probe your computer for open logins or easy guessable passwords. pam_shield is meant as an aid to protect public computers on the Internet.
c95daf9320832ac6105404ee8aeb842a90a9329e42bf719ab846810368290969
McAfee LinuxShield versions 1.5.1 and below remote root code execution exploit.
8a712c77c5f815392c4e24ddc1710f3207045d5ed4dc4bab7b4158ef20f58f68
Kingsoft WebShield KAVSafe.sys versions 2010.4.14.609(2010.5.23) and below suffer from a kernel mode local privilege escalation vulnerability.
17fca34022bf7c6b745aa66d33307d17c847110bb4ff1afb04b49e92d86e465d
Secunia Security Advisory - Xuanyuan Smart has reported a vulnerability in Kingsoft WebShield, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.
aee5e567a417c92b632eaa0c151f9ff9a67c61ee0b1c98d828755fd372ce8fd9
Secunia Security Advisory - Nikolas Sotiriu has reported a security issue in McAfee LinuxShield, which can be exploited by malicious, local users to gain escalated privileges.
e50ed7fe1f5df8ca48a5d88b5154a1e1dceb20d46dd06e4028c96c0b5f247b5d
McAfee LinuxShield versions 1.5.1 and below remote code execution proof of concept exploit.
d06d6fd6943d8a9711649f4fed45d0ff2d2d71cd45f67c4676a3b007c669a219