Known Vulnerabilities for Api C Client by Google

Listed below are 10 of the newest known vulnerabilities associated with "Api C Client" by "Google".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-24068 ** DISPUTED ** Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments... Not Provided 2023-01-23 2023-01-26
CVE-2023-23949 An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser. Not Provided 2023-01-26 2023-01-26
CVE-2023-23691 Dell EMC PV ME5, versions ME5.1.0.0.0 and ME5.1.0.1.0, contains a Client-side desync Vulnerability. An unauthenticated attack... Not Provided 2023-01-20 2023-01-20
CVE-2023-23608 Spotipy is a light weight Python library for the Spotify Web API. In versions prior to 2.22.1, if a malicious URI is passed t... Not Provided 2023-01-26 2023-01-26
CVE-2023-22622 WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security upda... Not Provided 2023-01-05 2023-01-05
CVE-2023-22551 The FTP (aka "Implementation of a simple FTP client and server") project through 96c1a35 allows remote attackers to cause a d... Not Provided 2023-01-01 2023-01-01
CVE-2023-22472 Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcl... Not Provided 2023-01-09 2023-01-09
CVE-2023-21893 Vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server. Supported versions that are affected... Not Provided 2023-01-18 2023-01-18
CVE-2023-0581 The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation... Not Provided 2023-01-30 2023-01-30
CVE-2023-0290 Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory trave... Not Provided 2023-01-18 2023-01-18

Popular searches for Api C Client

google/google-api-objectivec-client

github.com/google/google-api-objectivec-client

#google/google-api-objectivec-client Google APIs Client Library for Objective- Contribute to google google GitHub.

code.google.com/p/google-api-objectivec-client code.google.com/p/google-api-objectivec-client/source/checkout code.google.com/p/google-api-objectivec-client/wiki/BuildingTheLibrary github.com/google/google-api-objectivec-client/wiki code.google.com/p/google-api-objectivec-client GitHub Client (computing) Application programming interface Objective-C Google APIs Library (computing) Adobe Contribute Repository (version control) Command-line interface Xcode Google (verb) Microsoft Visual Studio Tag (metadata) Software repository Deprecation Download Package manager Commit (data management) README Software development

google/google-api-objectivec-client-for-rest

github.com/google/google-api-objectivec-client-for-rest

0 ,google/google-api-objectivec-client-for-rest Google APIs Client Library for Objective- for REST - google google -objectivec- client -for-rest

Client (computing) GitHub Application programming interface Library (computing) Google APIs Objective-C Representational state transfer MacOS Application software IOS JSON Xcode Wiki Command-line interface Microsoft Visual Studio Repository (version control) Software repository Class (computer programming) Google Tag (metadata)

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report