Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
desktop server vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2022-25249
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) (disregarding Axeda agent v6.9.2 and v6.9.3) is vulnerable to directory traversal, which could allow a remote unauthenticated malicious user to obtain file system read...
Ptc Axeda Agent
Ptc Axeda Desktop Server
5
CVSSv2
CVE-2022-25250
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an malicious user to send a certain command to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote una...
Ptc Axeda Agent
Ptc Axeda Desktop Server
5
CVSSv2
CVE-2022-25252
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) when receiving certain input throws an exception. Services using said function do not handle the exception. Successful exploitation of this vulnerability could allow a...
Ptc Axeda Agent
Ptc Axeda Desktop Server
5
CVSSv2
CVE-2022-25248
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) supplies the event log of the specific service.
Ptc Axeda Agent
Ptc Axeda Desktop Server
10
CVSSv2
CVE-2008-0356
Buffer overflow in the Independent Management Architecture (IMA) service in Citrix Presentation Server (MetaFrame Presentation Server) 4.5 and previous versions, Access Essentials 2.0 and previous versions, and Desktop Server 1.0 allows remote malicious users to execute arbitrary...
Citrix Desktop Server 1.0
Citrix Presentation Server
Citrix Access Essentials
Citrix Metaframe Presentation Server
10
CVSSv2
CVE-2017-5178
An issue exists in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is installed by default. The default system account is difficult to configure with non-default cr...
Schneider-electric Tableau Server 7.0
Schneider-electric Tableau Desktop 10.1.3
Schneider-electric Tableau Desktop 7.0
Schneider-electric Tableau Server 10.1.3
Schneider-electric Wonderware Intelligence
7.2
CVSSv2
CVE-2005-2711
ISS BlackIce 3.6, as used in multiple products including BlackICE PC Protection, Server Protection, Agent for Server, and RealSecure Desktop 3.6 and 7.0, does not drop privileges before launching help from the "More Info" button in the "Application Protection"...
Iss Realsecure Desktop 3.6
Iss Realsecure Desktop 7.0
Iss Blackice Agent Server
Iss Blackice Pc Protection 3.6
Iss Blackice Pc Protection 3.6cpu
Iss Blackice Server Protection
7.5
CVSSv2
CVE-2003-0766
Multiple heap-based buffer overflows in FTP Desktop client 3.5, and possibly earlier versions, allow remote malicious servers to execute arbitrary code via (1) a long FTP banner, (2) a long response to a USER command, or (3) a long response to a PASS command.
Ftp Desktop Ftp Desktop 3.5
2 EDB exploits
5
CVSSv2
CVE-2008-2299
Unspecified vulnerability in SecureICA and ICA Basic encryption of Citrix Presentation Server 4.5 and previous versions, Access Essentials 2.0 and previous versions, and Desktop Server 1.0 can cause clients to use weaker encryption settings than configured by the administrator, w...
Citrix Presentation Server
Citrix Desktop Server 1.0
Citrix Access Essentials
10
CVSSv2
CVE-2006-0736
Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote malicious users to execute arbitrary code via unspecified vectors.
Novell Open Enterprise Server 1
Novell Linux Desktop 9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »