Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
client vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2020-16268
The MSI installer in 1E Client 4.1.0.267 and 5.0.0.745 allows remote authenticated users and local users to gain elevated privileges via the repair option. This applies to installations that have a TRANSFORM (MST) with the option to disable the installation of the Nomad module. A...
1e Client 4.1.0.267
1e Client 5.0.0.745
4
CVSSv2
CVE-2020-27643
The %PROGRAMDATA%\1E\Client directory in 1E Client 5.0.0.745 and 4.1.0.267 allows remote authenticated users and local users to create and modify files in protected directories (where they would not normally have access to create or modify files) via the creation of a junction po...
1e Client 4.1.0.267
1e Client 5.0.0.745
7.2
CVSSv2
CVE-2013-3697
Integer overflow in the NWFS.SYS kernel driver 4.91.5.8 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003 and the NCPL.SYS kernel driver in Novell Client 2 SP2 on Windows Vista and Windows Server 2008 and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Win...
Novell Client 4.91
Novell Client 2.0
6.9
CVSSv2
CVE-2010-5203
Multiple untrusted search path vulnerabilities in NCP Secure Enterprise Client prior to 9.21 Build 68, Secure Entry Client prior to 9.23 Build 18, and Secure Client - Juniper Edition prior to 9.23 Build 18 allow local users to gain privileges via a Trojan horse (1) dvccsabase002....
Ncp-e Secure Enterprise Client
Ncp-e Secure Entry Client
Ncp-e Secure Client
7.5
CVSSv2
CVE-2008-2922
Stack-based buffer overflow in artegic Dana IRC client 1.3 and previous versions allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a long IRC message.
T0pp8uzz Dana Irc Client 1.1
T0pp8uzz Dana Irc Client 1.2
T0pp8uzz Dana Irc Client
2 EDB exploits
5
CVSSv2
CVE-2018-20812
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Pulsesecure Pulse Secure Desktop Client 4.0
Pulsesecure Pulse Secure Desktop Client 5.1
Pulsesecure Pulse Secure Desktop Client 5.1r
Pulsesecure Pulse Secure Desktop Client 5.3
Pulsesecure Pulse Secure Desktop Client 9.0
4
CVSSv2
CVE-2012-2498
Cisco AnyConnect Secure Mobility Client 3.0 up to and including 3.0.08066 does not ensure that authentication makes use of a legitimate certificate, which allows user-assisted man-in-the-middle malicious users to spoof servers via a crafted certificate, aka Bug ID CSCtz29197.
Cisco Anyconnect Secure Mobility Client 3.0.0629
Cisco Anyconnect Secure Mobility Client 3.0.08057
Cisco Anyconnect Secure Mobility Client 3.0.08066
Cisco Anyconnect Secure Mobility Client 3.0
Cisco Anyconnect Secure Mobility Client 3.0.07059
4.6
CVSSv2
CVE-2020-10940
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER up to and including 3.0.7 when installed to run as a service.
Phoenixcontact Portico Server 16 Client
Phoenixcontact Portico Server 1 Client
Phoenixcontact Portico Server 4 Client
9.3
CVSSv2
CVE-2006-6442
Stack-based buffer overflow in the SetClientInfo function in the CDDBControlAOL.CDDBAOLControl ActiveX control (cddbcontrol.dll), as used in America Online (AOL) 7.0 4114.563, 8.0 4129.230, and 9.0 Security Edition 4156.910, and possibly other products, allows remote malicious us...
Aol Aol Client Software 7.0 4114.563
Aol Aol Client Software 8.0 4129.230
Aol Aol Client Software 9.0
4
CVSSv2
CVE-2020-15141
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
Openapi-python-client Project Openapi-python-client
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »