Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
desktop vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2002-0120
Apple Palm Desktop 4.0b76 and 4.0b77 creates world-readable backup files and folders when a hotsync is performed, which could allow a local user to obtain sensitive information.
Palm Palm Desktop 4.0b76
Palm Palm Desktop 4.0b77
2.1
CVSSv2
CVE-2021-45449
Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining acc...
Docker Docker Desktop 4.3.1
Docker Docker Desktop 4.3.0
4.3
CVSSv2
CVE-2004-2492
Cross-site scripting (XSS) vulnerability in Groupmax World Wide Web (GmaxWWW) Desktop 5, 6, and Desktop for Jichitai 6, allows remote malicious users to inject arbitrary web script or HTML via the QUERY parameter.
Hitachi Groupmax World Wide Web Desktop 06 52
Hitachi Groupmax World Wide Web Desktop 06 51 C
Hitachi Groupmax World Wide Web Desktop 06 50 C
Hitachi Groupmax World Wide Web Desktop 05 00
Hitachi Groupmax World Wide Web Desktop 05 11 J
Hitachi Groupmax World Wide Web Desktop 06 00
Hitachi Groupmax World Wide Web Desktop 06 50 B
Hitachi Groupmax World Wide Web Desktop 06 51
Hitachi Groupmax World Wide Web Desktop 05 11 F
Hitachi Groupmax World Wide Web Desktop 06 51 B
Hitachi Groupmax World Wide Web Desktop 05 11 I
Hitachi Groupmax World Wide Web Desktop 06 52 B
NA
CVE-2023-28129
DSM 2022.2 SU2 and all prior versions allows a local low privileged account to execute arbitrary OS commands as the DSM software installation user.
Ivanti Desktop & Server Management 2022.2
Ivanti Desktop & Server Management
7.2
CVSSv2
CVE-2006-4887
Apple Remote Desktop (ARD) for Mac OS X 10.2.8 and later does not drop privileges on the remote machine while installing certain applications, which allows local users to bypass authentication and gain privileges by selecting the icon during installation. NOTE: it could be argued...
Apple Apple Remote Desktop 3.0.0
Apple Apple Remote Desktop 2.0.0
Apple Apple Remote Desktop 2.1.0
Apple Mac Os X
4.3
CVSSv2
CVE-2020-27769
In ImageMagick versions prior to 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
Imagemagick Imagemagick
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Desktop 5.0
Fedoraproject Fedora 33
5
CVSSv2
CVE-2006-4959
Sun Secure Global Desktop (SSGD, aka Tarantella) prior to 4.3 allows remote malicious users to obtain sensitive information, including hostnames, versions, and settings details, via unspecified vectors, possibly involving (1) taarchives.cgi, (2) ttaAuthentication.jsp, (3) ttalice...
Sun Secure Global Desktop 4.0
Sun Secure Global Desktop 3.42
NA
CVE-2023-0463
The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk.
Devolutions Remote Desktop Manager 2022.3.29
Devolutions Remote Desktop Manager 2022.3.30
7.2
CVSSv2
CVE-2013-1092
Multiple unquoted Windows search path vulnerabilities in Novell ZENworks Desktop Management (ZDM) 7 up to and including 7.1 might allow local users to gain privileges via a Trojan horse "program" file in the C: folder, related to an attempted launch of (1) ZenRem32.exe ...
Novell Zenworks Desktop Management 7
Novell Zenworks Desktop Management 7.1
9
CVSSv2
CVE-2003-1395
Buffer overflow in KaZaA Media Desktop 2.0 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a response to the ad server.
Kazaa Kazaa Media Desktop 2.0
Kazaa Kazaa Media Desktop 2.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »