[Forgot Password]
Login  Register Subscribe

24437

 
 

131950

 
 

117582

 
 

909

 
 

91563

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 13244 Download | Alert*

The host is installed with Cisco AnyConnect Secure Mobility Client 4.0.00051 and earlier and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle the host scan module. Successful exploitation could allow attackers to write to arbitrary files via crafted IPC messages.

The host is installed with Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle the CMainThread::launchDownloader function in vpndownloader.exe. Successful exploitation could allow attackers to gain privileges via a Trojan horse DLL in the current working directory.

The host is installed with Cisco AnyConnect Secure Mobility Client 4.2.05015 or 4.3.x through 4.3.02039 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to gain privileges via a crafted INF file.

The host is installed with Cisco AnyConnect Secure Mobility Client 4.3.02039 or 4.3.00748 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM ...

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.4.02034 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly validate input of path and file names of a DLL file before it is loaded. Successful exploitation could allow attackers to execute commands on the underlying Microsoft Windows host with privileges equivalen ...

The host is installed with Cisco AnyConnect Secure Mobility Client 4.4.00243 before 4.6 is prone to a session fixation vulnerability. A flaw is present in the application which fails to properly handle the authentication request in the company's Identity Provider (IdP). Successful exploitation could allow the attacker to hijack a valid authentication token and use that to establish an authenticate ...

An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect. An attacker who successfully exploited this vulnerability could use the information to further compromise the web application. The security update addresses the vulnerability by correcting how .NET Core handles redirects.

The host is installed with Oracle Java SE through 8u181 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to scripting. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE through 7u191, 8u181 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with Oracle Java SE through 6u201, 7u191, 8u181 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JNDI. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1324

© SecPod Technologies