Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
alice vulnerabilities and exploits
(subscribe to this query)
632
VMScore
CVE-2008-1269
cp06_wifi_m_nocifr.cgi in the admin panel on the Alice Gate 2 Plus Wi-Fi router does not verify authentication credentials, which allows remote malicious users to disable Wi-Fi encryption via a certain request.
Alice Gate2 Plus Wi-fi
755
VMScore
CVE-2006-5433
PHP remote file inclusion vulnerability in modules/guestbook/index.php in ALiCE-CMS 0.1 allows remote malicious users to execute arbitrary PHP code via a URL in the CONFIG[local_root] parameter.
Timm Maass Alice Cms 0.1
1 EDB exploit
935
VMScore
CVE-2007-4740
The HPRevolutionRegistryManager ActiveX control in Hp.Revolution.RegistryManager.dll 1 in Telecom Italy Alice Messenger allows remote malicious users to create registry keys and values via the arguments to the WriteRegistry method.
Telecom Italy Alice Messenger 1.1
1 EDB exploit
685
VMScore
CVE-2008-7165
Cross-site request forgery in cp06_wifi_m_nocifr.cgi in the administrator panel in TELECOM ITALIA Alice Gate2 Plus Wi-Fi allows remote malicious users to hijack the authentication of administrators for requests that disable Wi-Fi encryption via certain values for the wlChannel an...
Alice Gate2 Plus Wi-fi
1 EDB exploit
481
VMScore
CVE-2014-5543
The Hidden Object - Alice Free (aka air.com.differencegames.hovisionsofalicefree) application 1.0.17 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted cer...
Differencegames Hidden Object - Alice Free 1.0.17
445
VMScore
CVE-2018-7498
In Philips Alice 6 System version R8.0.2 or prior, the lack of proper data encryption passes up the guarantees of confidentiality, integrity, and accountability that properly implemented encryption conveys.
Philips Alice 6 Firmware
356
VMScore
CVE-2021-23991
If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid su...
Mozilla Thunderbird
668
VMScore
CVE-2018-5451
In Philips Alice 6 System version R8.0.2 or prior, when an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. This weakness can lead to the exposure of resources or functionality to unintended actors, possibly pr...
Philips Alice 6 Firmware
429
VMScore
CVE-2019-9506
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffi...
Google Android -
Apple Mac Os X 10.12.6
Apple Mac Os X 10.14.5
Apple Watchos 5.3
Apple Iphone Os 12.4
Apple Mac Os X 10.13.6
Apple Tvos 12.4
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Debian Debian Linux 8.0
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Mrg Realtime 2.0
Redhat Virtualization Host Eus 4.2
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Aus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Eus 8.4
5 Github repositories
2 Articles
690
VMScore
CVE-2009-4120
Multiple cross-site request forgery (CSRF) vulnerabilities in Quick.Cart 3.4 allow remote malicious users to hijack the authentication of the administrator for requests that (1) delete orders via an orders-delete action to admin.php, and possibly (2) delete products or (3) delete...
Opensolution Quick.cart 3.4
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started