Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
palm palm os vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-1008
PalmOS 3.5.2 and previous versions uses weak encryption to store the user password, which allows attackers with physical access to the Palm device to decrypt the password and gain access to the device.
Palm Palm Os
1 EDB exploit
NA
CVE-2002-0116
Palm OS 3.5h and possibly other versions, as used in Handspring Visor and Xircom products, allows remote malicious users to cause a denial of service via a TCP connect scan, e.g. from nmap.
Palm Palm Os 3.5h
NA
CVE-2001-0157
Debugging utility in the backdoor mode of Palm OS 3.5.2 and previous versions allows attackers with physical access to a Palm device to bypass access restrictions and obtain passwords, even if the system lockout mechanism is enabled.
Palm Palm Os 3.5.2
NA
CVE-2001-1438
Handspring Visor 1.0 and 1.0.1 with the VisorPhone Springboard module installed allows remote malicious users to cause a denial of service (PalmOS crash and VisorPhone database corruption) by sending a large or crafted SMS image.
Palm Palm Os
Handspring Visor 1.0
Handspring Visor 1.0.1
NA
CVE-2007-0859
The Find feature in Palm OS Treo smart phones operates despite the system password lock, which allows attackers with physical access to obtain sensitive information (memory contents) by doing (1) text searches or (2) paste operations after pressing certain keyboard shortcut keys.
Palm Treo 700p
Palm Treo 650
Palm Treo 680
NA
CVE-2007-4213
Palm OS on Treo 650, 680, 700p, and 755p Smart phones allows remote malicious users to cause a denial of service (device reset or hang) via a flood of large ICMP echo requests. NOTE: this is probably a different vulnerability than CVE-2003-0293.
Palm Palm Os
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started