Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
desktop vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0120
Apple Palm Desktop 4.0b76 and 4.0b77 creates world-readable backup files and folders when a hotsync is performed, which could allow a local user to obtain sensitive information.
Palm Palm Desktop 4.0b76
Palm Palm Desktop 4.0b77
5.5
CVSSv3
CVE-2021-45449
Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining acc...
Docker Docker Desktop 4.3.1
Docker Docker Desktop 4.3.0
NA
CVE-2004-2492
Cross-site scripting (XSS) vulnerability in Groupmax World Wide Web (GmaxWWW) Desktop 5, 6, and Desktop for Jichitai 6, allows remote malicious users to inject arbitrary web script or HTML via the QUERY parameter.
Hitachi Groupmax World Wide Web Desktop 06 52
Hitachi Groupmax World Wide Web Desktop 06 51 C
Hitachi Groupmax World Wide Web Desktop 06 50 C
Hitachi Groupmax World Wide Web Desktop 05 00
Hitachi Groupmax World Wide Web Desktop 05 11 J
Hitachi Groupmax World Wide Web Desktop 06 00
Hitachi Groupmax World Wide Web Desktop 06 50 B
Hitachi Groupmax World Wide Web Desktop 06 51
Hitachi Groupmax World Wide Web Desktop 05 11 F
Hitachi Groupmax World Wide Web Desktop 06 51 B
Hitachi Groupmax World Wide Web Desktop 05 11 I
Hitachi Groupmax World Wide Web Desktop 06 52 B
7.8
CVSSv3
CVE-2023-28129
DSM 2022.2 SU2 and all prior versions allows a local low privileged account to execute arbitrary OS commands as the DSM software installation user.
Ivanti Desktop & Server Management 2022.2
Ivanti Desktop & Server Management
NA
CVE-2006-4887
Apple Remote Desktop (ARD) for Mac OS X 10.2.8 and later does not drop privileges on the remote machine while installing certain applications, which allows local users to bypass authentication and gain privileges by selecting the icon during installation. NOTE: it could be argued...
Apple Apple Remote Desktop 3.0.0
Apple Apple Remote Desktop 2.0.0
Apple Apple Remote Desktop 2.1.0
Apple Mac Os X
3.3
CVSSv3
CVE-2020-27769
In ImageMagick versions prior to 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
Imagemagick Imagemagick
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Desktop 5.0
Fedoraproject Fedora 33
NA
CVE-2006-4959
Sun Secure Global Desktop (SSGD, aka Tarantella) prior to 4.3 allows remote malicious users to obtain sensitive information, including hostnames, versions, and settings details, via unspecified vectors, possibly involving (1) taarchives.cgi, (2) ttaAuthentication.jsp, (3) ttalice...
Sun Secure Global Desktop 4.0
Sun Secure Global Desktop 3.42
3.3
CVSSv3
CVE-2023-0463
The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk.
Devolutions Remote Desktop Manager 2022.3.29
Devolutions Remote Desktop Manager 2022.3.30
NA
CVE-2013-1092
Multiple unquoted Windows search path vulnerabilities in Novell ZENworks Desktop Management (ZDM) 7 up to and including 7.1 might allow local users to gain privileges via a Trojan horse "program" file in the C: folder, related to an attempted launch of (1) ZenRem32.exe ...
Novell Zenworks Desktop Management 7
Novell Zenworks Desktop Management 7.1
NA
CVE-2003-1395
Buffer overflow in KaZaA Media Desktop 2.0 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a response to the ad server.
Kazaa Kazaa Media Desktop 2.0
Kazaa Kazaa Media Desktop 2.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »