Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
secure elements class 5 enterprise vulnerability management vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2006-2706
Secure Elements Class 5 AVR server (aka C5 EVM) prior to 2.8.1 allows remote malicious users to cause a denial of service via forged "session start" messages that cause AVR to connect to arbitrary hosts.
Secure Elements Class 5 Enterprise Vulnerability Management
5
CVSSv2
CVE-2006-2708
Secure Elements Class 5 AVR client (aka C5 EVM) prior to 2.8.1 allows remote malicious users to read portions of process memory via a modified size for (1) EM_GET_CE_PARAMETER and (2) EM_SET_CE_PARAMETER messages, which leads to a buffer overflow (probably an over-read).
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
5
CVSSv2
CVE-2006-2707
Secure Elements Class 5 AVR server (aka C5 EVM) prior to 2.8.1 does not validate the peer certificate when obtaining an update, which could allow remote malicious users to distribute malicious updates to clients.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
5
CVSSv2
CVE-2006-2709
Secure Elements Class 5 AVR (aka C5 EVM) prior to 2.8.1 do not validate the source address of a message, which allows remote malicious users to (1) execute arbitrary code on a client or (2) forge messages to the server.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
5
CVSSv2
CVE-2006-2711
Secure Elements Class 5 AVR (aka C5 EVM) 2.8.1 and previous versions, and possibly later 2.8.x releases, uses the same initialization vector and key for each message session, which allows remote malicious users to obtain potentially sensitive information about messages.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
5
CVSSv2
CVE-2006-2710
Secure Elements Class 5 AVR (aka C5 EVM) prior to 2.8.1 uses the same invariant RSA key for all installations, which allows remote attackers with the key to decrypt communications.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
5
CVSSv2
CVE-2006-2712
Secure Elements Class 5 AVR (aka C5 EVM) client and server prior to 2.8.1 do not verify the integrity of a message digest, which allows remote malicious users to modify and replay messages.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
7.5
CVSSv2
CVE-2006-2716
Secure Elements Class 5 AVR server (aka C5 EVM) prior to 2.8.1 uses a hard-coded user ID and password, which allows remote malicious users to gain access to the server.
Secure Elements C5 Enterprise Vulnerability Management
7.5
CVSSv2
CVE-2006-2715
The Administration Console in Secure Elements Class 5 AVR (aka C5 EVM) prior to 2.8.1 does not enforce access control, which allows remote malicious users to gain access to servers via the console.
Secure Elements C5 Enterprise Vulnerability Management
5
CVSSv2
CVE-2006-2713
Secure Elements Class 5 AVR client (aka C5 EVM) prior to 2.8.1 generates predictable CEIDs, which allows remote malicious users to determine the CEID of a protected asset, which can be used in other attacks against AVR.
Secure Elements C5 Enterprise Vulnerability Management
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »