Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ca vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2004-0590
FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x prior to 1.0.6, openswan 2.x prior to 2.1.4, and strongSwan prior to 2.1.3, allows remote malicious users to authenticate using spoofed PKCS#7 certificates in which a self-signed certifica...
Frees Wan Frees Wan 1
Frees Wan Frees Wan 2
Frees Wan Super Frees Wan 1
Openswan Openswan 1
Openswan Openswan 2
Strongswan Strongswan
890
VMScore
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
890
VMScore
CVE-2002-0012
Vulnerabilities in a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into m...
Snmp Snmp
890
VMScore
CVE-2001-0960
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote malicious users to gain privileges.
Broadcom Arcserve Backup 6.61
Broadcom Arcserve Backup 2000
Ca Arcserve Backup 2000
890
VMScore
CVE-2000-0762
The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote malicious users to spoof the eTrust administrator and gain privileges.
Ca Etrust Access Control 5.0
Ca Etrust Access Control 4.1
Broadcom Etrust Access Control 4.1
Broadcom Etrust Access Control 5.0
828
VMScore
CVE-2017-10824
Untrusted search path vulnerability in TDB CA TypeA use software Version 5.2 and previous versions, distributed until 10 August 2017 allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Teikoku Databank Type A 5.2
828
VMScore
CVE-2016-2422
Wi-Fi in Android 4.x prior to 4.4.4, 5.0.x prior to 5.0.2, 5.1.x prior to 5.1.1, and 6.x prior to 2016-04-01 does not prevent use of a Wi-Fi CA certificate in an unrelated CA role, which allows malicious users to gain privileges via a crafted application, as demonstrated by obtai...
Google Android 6.0.1
Google Android 6.0
Google Android 4.1.2
Google Android 5.1
Google Android 5.0
Google Android 4.2.2
Google Android 4.2
Google Android 4.0.2
Google Android 4.0
Google Android 5.1.0
Google Android 5.0.1
Google Android 4.4.3
Google Android 4.3
Google Android 4.2.1
Google Android 4.0.1
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.4.2
Google Android 4.4.1
Google Android 4.4
Google Android 4.3.1
828
VMScore
CVE-2011-1719
Multiple stack-based buffer overflows in the Web Viewer ActiveX controls in CA Output Management Web Viewer 11.0 and 11.5 allow remote malicious users to execute arbitrary code via (1) a long SRC property value to the PPSViewer ActiveX control in PPSView.ocx prior to 1.0.0.7 or (...
Broadcom Output Management Web Viewer 11.5
Broadcom Output Management Web Viewer 11.0
828
VMScore
CVE-2009-3587
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other...
Ca Internet Security Suite Plus 2009
Ca Gateway Security R8.1
Ca Common Services 3.1
Ca Etrust Secure Content Manager 8.0
Ca Etrust Anti-virus Sdk
Ca Anti-virus For The Enterprise R8.1
Ca Arcserve For Windows Server Component
Ca Etrust Intrusion Detection 2.0
Ca Threat Manager 8.1
Ca Protection Suites R3
Ca Etrust Ez Antivirus R7.1
Ca Internet Security Suite 2008
Ca Anti-virus 2009
Ca Etrust Intrusion Detection 3.0
Ca Anti-virus Plus 2009
Ca Protection Suites R3.1
Ca Anti-virus Gateway 7.1
Ca Threat Manager R8
Ca Etrust Anti-virus Gateway 7.1
Ca Arcserve For Windows Client Agent
Ca Arcserve Backup R11.5
Ca Threat Manager Total Defense
828
VMScore
CVE-2008-5529
CA eTrust Antivirus 31.6.6086, when Internet Explorer 6 or 7 is used, allows remote malicious users to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a ....
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »