Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft remote desktop connection client 6.1 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2013-1296
The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection Client 6.1 and 7.0 does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code via a web page that triggers access to a deleted object, and allow...
Microsoft Remote Desktop Connection 7.0
Microsoft Remote Desktop Connection 6.1
1 Article
828
VMScore
CVE-2011-0029
Untrusted search path vulnerability in the client in Microsoft Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remot...
Microsoft Remote Desktop Connection Client 5.2
Microsoft Remote Desktop Connection Client 6.0
Microsoft Windows 2003 Server
Microsoft Windows Server 2003
Microsoft Windows Xp -
Microsoft Remote Desktop Connection Client 7.0
Microsoft Windows 7 -
Microsoft Windows Server 2008 R2
Microsoft Remote Desktop Connection Client 6.1
Microsoft Windows Server 2008
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Xp
828
VMScore
CVE-2009-1133
Heap-based buffer overflow in Microsoft Remote Desktop Connection (formerly Terminal Services Client) running RDP 5.0 up to and including 6.1 on Windows, and Remote Desktop Connection Client for Mac 2.0, allows remote malicious users to execute arbitrary code via unspecified para...
Microsoft Windows Xp -
Microsoft Windows Server 2008
Microsoft Windows Server 2003
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Vista -
Microsoft Windows 2000 -
Microsoft Windows Xp
828
VMScore
CVE-2009-1929
Heap-based buffer overflow in the Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3; allows remote malicious users to execute arbitrary code via unspecified parameter...
Microsoft Windows 2003 Server Sp2
Microsoft Windows Xp -
Microsoft Windows Server 2008 -
Microsoft Windows Xp
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Vista -
356
VMScore
CVE-2015-7976
The ntpq saveconfig command in NTP 4.1.2, 4.2.x prior to 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows malicious users to cause unspecified impact via a crafted filename.
Ntp Ntp 4.1.2
Ntp Ntp
Ntp Ntp 4.3.0
Ntp Ntp 4.3.1
Ntp Ntp 4.3.16
Ntp Ntp 4.3.17
Ntp Ntp 4.3.24
Ntp Ntp 4.3.25
Ntp Ntp 4.3.31
Ntp Ntp 4.3.32
Ntp Ntp 4.3.39
Ntp Ntp 4.3.4
Ntp Ntp 4.3.47
Ntp Ntp 4.3.48
Ntp Ntp 4.3.54
Ntp Ntp 4.3.55
Ntp Ntp 4.3.61
Ntp Ntp 4.3.62
Ntp Ntp 4.3.63
Ntp Ntp 4.3.7
Ntp Ntp 4.3.70
Ntp Ntp 4.3.77
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-21111
CVE-2024-32884
IDOR
CVE-2023-1000
CVE-2024-33260
CVE-2024-3682
reflected XSS
race condition
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started