Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
client vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2013-3697
Integer overflow in the NWFS.SYS kernel driver 4.91.5.8 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003 and the NCPL.SYS kernel driver in Novell Client 2 SP2 on Windows Vista and Windows Server 2008 and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Win...
Novell Client 4.91
Novell Client 2.0
4
CVSSv2
CVE-2020-27643
The %PROGRAMDATA%\1E\Client directory in 1E Client 5.0.0.745 and 4.1.0.267 allows remote authenticated users and local users to create and modify files in protected directories (where they would not normally have access to create or modify files) via the creation of a junction po...
1e Client 4.1.0.267
1e Client 5.0.0.745
7.1
CVSSv2
CVE-2008-1106
The management interface in Akamai Client (formerly Red Swoosh) 3322 and previous versions allows remote malicious users to bypass authentication via an HTTP request that contains (1) no Referer header, or (2) a spoofed Referer header that matches an approved domain, which allows...
Akamai Technologies Client
Red Swoosh Client
7.5
CVSSv2
CVE-2008-2922
Stack-based buffer overflow in artegic Dana IRC client 1.3 and previous versions allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a long IRC message.
T0pp8uzz Dana Irc Client 1.1
T0pp8uzz Dana Irc Client 1.2
T0pp8uzz Dana Irc Client
2 EDB exploits
6.9
CVSSv2
CVE-2010-5203
Multiple untrusted search path vulnerabilities in NCP Secure Enterprise Client prior to 9.21 Build 68, Secure Entry Client prior to 9.23 Build 18, and Secure Client - Juniper Edition prior to 9.23 Build 18 allow local users to gain privileges via a Trojan horse (1) dvccsabase002....
Ncp-e Secure Enterprise Client
Ncp-e Secure Entry Client
Ncp-e Secure Client
4
CVSSv2
CVE-2012-2498
Cisco AnyConnect Secure Mobility Client 3.0 up to and including 3.0.08066 does not ensure that authentication makes use of a legitimate certificate, which allows user-assisted man-in-the-middle malicious users to spoof servers via a crafted certificate, aka Bug ID CSCtz29197.
Cisco Anyconnect Secure Mobility Client 3.0.0629
Cisco Anyconnect Secure Mobility Client 3.0.08057
Cisco Anyconnect Secure Mobility Client 3.0.08066
Cisco Anyconnect Secure Mobility Client 3.0
Cisco Anyconnect Secure Mobility Client 3.0.07059
5
CVSSv2
CVE-2018-20812
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Pulsesecure Pulse Secure Desktop Client 4.0
Pulsesecure Pulse Secure Desktop Client 5.1
Pulsesecure Pulse Secure Desktop Client 5.1r
Pulsesecure Pulse Secure Desktop Client 5.3
Pulsesecure Pulse Secure Desktop Client 9.0
4.6
CVSSv2
CVE-2020-10940
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER up to and including 3.0.7 when installed to run as a service.
Phoenixcontact Portico Server 16 Client
Phoenixcontact Portico Server 1 Client
Phoenixcontact Portico Server 4 Client
9.3
CVSSv2
CVE-2006-6442
Stack-based buffer overflow in the SetClientInfo function in the CDDBControlAOL.CDDBAOLControl ActiveX control (cddbcontrol.dll), as used in America Online (AOL) 7.0 4114.563, 8.0 4129.230, and 9.0 Security Edition 4156.910, and possibly other products, allows remote malicious us...
Aol Aol Client Software 7.0 4114.563
Aol Aol Client Software 8.0 4129.230
Aol Aol Client Software 9.0
7.2
CVSSv2
CVE-2006-4315
Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server prior to 4.4.5, and Manager 2.12 and previous versions, when running on Windows, might allow local users to gain privileges via a malici...
Ssh Tectia Client 4.0.4
Ssh Tectia Client 4.0.5
Ssh Tectia Client 4.2
Ssh Tectia Client 4.3.4
Ssh Tectia Client 4.3.5
Ssh Tectia Client 4.4.3
Ssh Tectia Client 4.4.4
Ssh Tectia Manager 2.1.2
Ssh Tectia Server 4.0
Ssh Tectia Server 4.3.2
Ssh Tectia Server 4.3.3
Ssh Tectia Server 4.4.3
Ssh Tectia Server 4.4.4
Ssh Tectia Client 4.0
Ssh Tectia Client 4.3.1
Ssh Tectia Client 4.3.1j
Ssh Tectia Client 4.3.8k
Ssh Tectia Client 4.4
Ssh Tectia Client 5.0.1
Ssh Tectia Connector 5.0
Ssh Tectia Server 4.0.5
Ssh Tectia Server 4.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »