Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft remote desktop connection client 6.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-1296
The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection Client 6.1 and 7.0 does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code via a web page that triggers access to a deleted object, and allow...
Microsoft Remote Desktop Connection 7.0
Microsoft Remote Desktop Connection 6.1
1 Article
NA
CVE-2011-0029
Untrusted search path vulnerability in the client in Microsoft Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remot...
Microsoft Remote Desktop Connection Client 5.2
Microsoft Remote Desktop Connection Client 6.0
Microsoft Windows 2003 Server
Microsoft Windows Server 2003
Microsoft Windows Xp -
Microsoft Remote Desktop Connection Client 7.0
Microsoft Windows 7 -
Microsoft Windows Server 2008 R2
Microsoft Remote Desktop Connection Client 6.1
Microsoft Windows Server 2008
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Xp
NA
CVE-2009-1133
Heap-based buffer overflow in Microsoft Remote Desktop Connection (formerly Terminal Services Client) running RDP 5.0 up to and including 6.1 on Windows, and Remote Desktop Connection Client for Mac 2.0, allows remote malicious users to execute arbitrary code via unspecified para...
Microsoft Windows Xp -
Microsoft Windows Server 2008
Microsoft Windows Server 2003
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Vista -
Microsoft Windows 2000 -
Microsoft Windows Xp
NA
CVE-2009-1929
Heap-based buffer overflow in the Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3; allows remote malicious users to execute arbitrary code via unspecified parameter...
Microsoft Windows 2003 Server Sp2
Microsoft Windows Xp -
Microsoft Windows Server 2008 -
Microsoft Windows Xp
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Vista -
4.3
CVSSv3
CVE-2015-7976
The ntpq saveconfig command in NTP 4.1.2, 4.2.x prior to 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows malicious users to cause unspecified impact via a crafted filename.
Ntp Ntp 4.1.2
Ntp Ntp
Ntp Ntp 4.3.0
Ntp Ntp 4.3.1
Ntp Ntp 4.3.16
Ntp Ntp 4.3.17
Ntp Ntp 4.3.24
Ntp Ntp 4.3.25
Ntp Ntp 4.3.31
Ntp Ntp 4.3.32
Ntp Ntp 4.3.39
Ntp Ntp 4.3.4
Ntp Ntp 4.3.47
Ntp Ntp 4.3.48
Ntp Ntp 4.3.54
Ntp Ntp 4.3.55
Ntp Ntp 4.3.61
Ntp Ntp 4.3.62
Ntp Ntp 4.3.63
Ntp Ntp 4.3.7
Ntp Ntp 4.3.70
Ntp Ntp 4.3.77
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started