Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
client vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2007-4415
Cisco VPN Client on Windows prior to 5.0.01.0600, and the 5.0.01.0600 InstallShield (IS) release, uses weak permissions for cvpnd.exe (Modify granted to Interactive Users), which allows local users to gain privileges via a modified cvpnd.exe.
Cisco Vpn Client 5.0.01.0600
Cisco Vpn Client
NA
CVE-2023-0073
The Client Logo Carousel WordPress plugin up to and including 3.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored...
Client Logo Carousel Project Client Logo Carousel
580
VMScore
CVE-2019-10392
Jenkins Git Client Plugin 2.8.4 and previous versions and 3.0.0-rc did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.
Jenkins Git Client 3.0.0
Jenkins Git Client
2 Github repositories
534
VMScore
CVE-2020-15142
In openapi-python-client before version 0.5.3, clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution.
Openapi-python-client Project Openapi-python-client
NA
CVE-2022-39397
aliyun-oss-client is a rust client for Alibaba Cloud OSS. Users of this library will be affected, the incoming secret will be disclosed unintentionally. This issue has been patched in version 0.8.1.
Aliyun-oss-client Project Aliyun-oss-client
384
VMScore
CVE-2017-1000209
The Java WebSocket client nv-websocket-client does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL/TLS servers via an arb...
Nv-websocket-client Project Nv-websocket-client
356
VMScore
CVE-2020-15141
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
Openapi-python-client Project Openapi-python-client
356
VMScore
CVE-2021-21421
node-etsy-client is a NodeJs Etsy ReST API Client. Applications that are using node-etsy-client and reporting client error to the end user will offer api key value too This is fixed in node-etsy-client v0.3.0 and later.
Node-etsy-client Project Node-etsy-client
641
VMScore
CVE-2006-4315
Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server prior to 4.4.5, and Manager 2.12 and previous versions, when running on Windows, might allow local users to gain privileges via a malici...
Ssh Tectia Client 4.0.4
Ssh Tectia Client 4.0.5
Ssh Tectia Client 4.2
Ssh Tectia Client 4.3.4
Ssh Tectia Client 4.3.5
Ssh Tectia Client 4.4.3
Ssh Tectia Client 4.4.4
Ssh Tectia Manager 2.1.2
Ssh Tectia Server 4.0
Ssh Tectia Server 4.3.2
Ssh Tectia Server 4.3.3
Ssh Tectia Server 4.4.3
Ssh Tectia Server 4.4.4
Ssh Tectia Client 4.0
Ssh Tectia Client 4.3.1
Ssh Tectia Client 4.3.1j
Ssh Tectia Client 4.3.8k
Ssh Tectia Client 4.4
Ssh Tectia Client 5.0.1
Ssh Tectia Connector 5.0
Ssh Tectia Server 4.0.5
Ssh Tectia Server 4.2.1
1000
VMScore
CVE-2015-1497
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote malicious users to execute arbitrary commands via a crafted request to TCP port 3465.
Persistent Systems Radia Client Automation 7.9
Persistent Systems Radia Client Automation 8.1
Persistent Systems Radia Client Automation 9.0
Persistent Systems Radia Client Automation 9.1
3 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »