[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Cisco AnyConnect Secure Mobility Client 4.0.00051 and earlier and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.5080 or 3.1 through 3.1.02043 and is prone to an input validation vulnerability. A flaw is present in the application which fails to properly verify the files. successful exploitation could allow attackers to gain privileges via unspecified vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle the CMainThread::launchDownloader function in vpndownloader.exe. Successful exploitation could allow attackers to gain privileges via a Trojan horse DLL in the current working directory.

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.2.05015 or 4.3.x before 4.3.02039 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to gain privileges via a crafted INF file.

The host is installed with Cisco AnyConnect Secure Mobility Client 4.3.02039 or 4.3.00748 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM ...

The host is installed with Cisco AnyConnect Secure Mobility Client 4.0.00051 and earlier and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client through 4.0.00051 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.5080 or 3.1.0 through 3.1.02043 and is prone to an input validation vulnerability. A flaw is present in the application which fails to properly verify the files. successful exploitation could allow attackers to gain privileges via unspecified vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 2.0.0343 through 2.5.3055 and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to properly handle the Active Template Library (ATL) framework in the VPNAPI COM module. successful exploitation could allow attackers to execute arbitrary code via a crafted HTML document.

The host is installed with Cisco VPN Client on Windows before 5.0.01.0600 or 5.0.01.0600 InstallShield (IS) and is prone to privilege escalation vulnerability. A flaw is present in the application due to weak permissions for cvpnd.exe. Successful exploitation allows local attackers to gain privileges via a modified cvpnd.exe.


Pages:      Start    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    1415    1416    1417    1418    ..   1516

© SecPod Technologies