Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
class class vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-5710
The Cisco Class Locator Fast Lane (aka com.tabletkings.mycompany.fastlane.cisco) application for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate...
Flane Cisco Class Locator Fast Lane -
NA
CVE-2005-0360
The Microsoft Log Sink Class ActiveX control in pkmcore.dll is marked as "safe for scripting" for Internet Explorer, which allows remote malicious users to create or append to arbitrary files.
Microsoft Log Sink Class Activex Control
NA
CVE-2006-5395
Buffer overflow in Microsoft Class Package Export Tool (aka clspack.exe) allows context-dependent malicious users to execute arbitrary code via a long string. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
Microsoft Class Package Export Tool 5.0.2752
1 EDB exploit
NA
CVE-2006-2706
Secure Elements Class 5 AVR server (aka C5 EVM) prior to 2.8.1 allows remote malicious users to cause a denial of service via forged "session start" messages that cause AVR to connect to arbitrary hosts.
Secure Elements Class 5 Enterprise Vulnerability Management
NA
CVE-2006-2707
Secure Elements Class 5 AVR server (aka C5 EVM) prior to 2.8.1 does not validate the peer certificate when obtaining an update, which could allow remote malicious users to distribute malicious updates to clients.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
NA
CVE-2006-2708
Secure Elements Class 5 AVR client (aka C5 EVM) prior to 2.8.1 allows remote malicious users to read portions of process memory via a modified size for (1) EM_GET_CE_PARAMETER and (2) EM_SET_CE_PARAMETER messages, which leads to a buffer overflow (probably an over-read).
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
NA
CVE-2006-2709
Secure Elements Class 5 AVR (aka C5 EVM) prior to 2.8.1 do not validate the source address of a message, which allows remote malicious users to (1) execute arbitrary code on a client or (2) forge messages to the server.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
NA
CVE-2006-2710
Secure Elements Class 5 AVR (aka C5 EVM) prior to 2.8.1 uses the same invariant RSA key for all installations, which allows remote attackers with the key to decrypt communications.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
NA
CVE-2006-2712
Secure Elements Class 5 AVR (aka C5 EVM) client and server prior to 2.8.1 do not verify the integrity of a message digest, which allows remote malicious users to modify and replay messages.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
NA
CVE-2006-2711
Secure Elements Class 5 AVR (aka C5 EVM) 2.8.1 and previous versions, and possibly later 2.8.x releases, uses the same initialization vector and key for each message session, which allows remote malicious users to obtain potentially sensitive information about messages.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »